Red Hot Cyber. The Cybersecurity Blog
What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...
What is a zero-day and the risk of targeted cyber attacks
Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...
Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...
Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...
What is cyber warfare? Between geopolitics, economics, and technology.
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...
Featured Articles

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...

Why privacy does not exist.
Author Massimiliano Brolli Translation: Vincenzo Marcovecchio Pubblication date: 18/12/2021 Privacy, privacy, privacy, … privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work, we
Electronic warfare (EW) between the USA, China, South and North Korea (part two)
Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of the next president of South Korea. To begin the command

North Korea’s cyberwarfare and its cyber army (part one)
Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so little to comprehend what’s happening there. Maybe

Making the cyber world a safer and better place: an interview with W1ntermute
Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This is incredibly challenging. Of course, it’s not that easy in

Ada Lovelace and Charles Babbage, pioneers of programmable computing
Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction – Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution. Inventors and

Dharma/Crysis: Overview and adversary tracking
Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems, such as RDP. The initial intrusions usually take place via

Threat Actors IntelBroker Release Alleged Equifax Data on Underground Forum
RHC Dark Lab - July 13th, 2024
Recently, a threat actor in an underground forum published an alleged data breach. This incident was revealed by a user named IntelBroker on BreachForums, a notorious online community for cybercriminal...

Hospitals tremble! Ransomcortex arrives. ransomware gang targeting healthcare facilities
RHC Dark Lab - July 12th, 2024
Recently, the landscape of cyber threats has been enriched by the emergence of a new ransomware group named "Ransomcortex". This group is distinguished by its specialization in attacking healthcare facilities,...

RHC interviews Vanir Group. Former affiliates of LockBit, Karakurt and Knight united to extort money: ‘Hire professionals, don’t be cheap’
RHC Dark Lab - July 12th, 2024
New threat actors often emerge every day to destabilize the digital foundations of organizations around the world. One of the most recent and disturbing cybergangs uncovered by Darklab of Red...

End of an Era: SiegedSec, the Hacker Group, Announces Its Dissolution
Pietro Melillo - July 11th, 2024
The cybercriminal group SiegedSec, which gained notoriety during Russia's invasion of Ukraine, has recently announced its dissolution. This group, led by "YourAnonWolf," quickly consolidated its power by increasing the number...
Sign up for the newsletter