Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
Di Redazione RHC - 16/07/2025

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...

What is a zero-day and the risk of targeted cyber attacks
Di Redazione RHC - 16/07/2025

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
Di Redazione RHC - 16/07/2025

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
Di Redazione RHC - 15/07/2025

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...

What is cyber warfare? Between geopolitics, economics, and technology.
Di Redazione RHC - 12/07/2025

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...

Facebook Breach 2024: Sensitive User Data Up for Sale by Hacker on Breach Forums

- July 6th, 2024

Recently, a threat actor in an underground forum published an alleged data breach. This incident involves the purported exposure of a substantial Facebook user database. The compromised data includes sensitive...

  

Taylor Swift’s Tour at Risk: Hacker Demands $2 Million from Ticketmaster for 170k Stolen Barcodes

- July 5th, 2024

A cyber incident has hit Ticketmaster, with a malicious actor issuing a ransom demand, threatening to release sensitive data unless a payment of $2 million USD is made. The hacker...

  

Critical Apache Tomcat Vulnerability CVE-2024-34750 Could Bring Your Server to a Halt!

- July 5th, 2024

The vulnerability CVE-2024-34750 in Apache Tomcat, as described in the security bulletin AL01/240705/CSIRT-ITA, concerns an issue that can be exploited to overload the server's computing resources, leading to a Denial...

  

Threat Actors: Alleged Data Breach of Ukraine Traffic Police

- July 5th, 2024

Recently, a threat actor in an underground forum published an alleged data breach. The leak purportedly involves sensitive information from the Ukraine traffic police (GAI). The data, spanning millions of...

  

Sign up for the newsletter