Red Hot Cyber. The Cybersecurity Blog
What is Red Team? A journey into the world of offensive security experts.
The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...
UK: Strict rules for online age verification. Pornhub and YouPorn will comply.
Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...
Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!
During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...
What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a Chief Information Security Officer does? This p...
SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These a...
ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers...
Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event designed to bring young people clos...
Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, reward...
Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future
Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives...
What are penetration tests, why are they done, who performs them, and the benefits for organizations.
Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order to identify and a...
Featured Articles

The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...

Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...

During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...

How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a Chief Information Security Officer does? This p...

In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These a...

Threat Actor 888 Claims Compromise of BMW (Hong Kong) Customers
Pietro Melillo - July 15th, 2024
Recently, a concerning news story has emerged in the world of cybersecurity. A well-known hacker, identified by the nickname 888, has allegedly leaked sensitive data belonging to BMW customers in...

RHC interviews Ransomcortex, the gang targeting Hospitals. “pay the ransom, we won’t even spare the CEO’s family.”
RHC Dark Lab - July 15th, 2024
Ransomcortex is a new cyber ransomware gang that resonates menacingly in the healthcare sector. This group has quickly attracted attention for its specialization in attacks on healthcare facilities, striking four...

Threat Actors IntelBroker Release Alleged Equifax Data on Underground Forum
RHC Dark Lab - July 13th, 2024
Recently, a threat actor in an underground forum published an alleged data breach. This incident was revealed by a user named IntelBroker on BreachForums, a notorious online community for cybercriminal...

Hospitals tremble! Ransomcortex arrives. ransomware gang targeting healthcare facilities
RHC Dark Lab - July 12th, 2024
Recently, the landscape of cyber threats has been enriched by the emergence of a new ransomware group named "Ransomcortex". This group is distinguished by its specialization in attacking healthcare facilities,...
Sign up for the newsletter