Red Hot Cyber. The Cybersecurity Blog
Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.
The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These a...
BreachForums is back online! 7.3 million posts and 340,000 users restored.
If weeds aren’t pulled out by the roots, they’ll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the roots of RaidForums! Br...
What is Red Team? A journey into the world of offensive security experts.
The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...
UK: Strict rules for online age verification. Pornhub and YouPorn will comply.
Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...
Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!
During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...
What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a Chief Information Security Officer does? This p...
SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These a...
ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers...
Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event designed to bring young people clos...
Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, reward...
Featured Articles

The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These a...

If weeds aren’t pulled out by the roots, they’ll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the roots of RaidForums! Br...

The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...

Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...

During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...

Play Ransomware Claims Attack on MIPS Technologies
Pietro Melillo - July 18th, 2024
In the last few hours, the Data Leak site of the ransomware gang Play Ransomware has published a new claim: the giant MIPS Technologies (www.mips.com) has been the victim of...

Data Breach: Personal Information of 6K NATO Employees for Sale
Pietro Melillo - July 18th, 2024
On July 17, 2024, user Vadimblyaa posted on a well-known cybercriminal forum, claiming to possess personal information of 6,000 NATO employees, acquired through a data breach that occurred on July...

Alleged Cyber Attack on Sheba Medical Center: Israel’s Largest Hospital
Pietro Melillo - July 16th, 2024
The Sheba Medical Center, the largest hospital in Israel and ranked ninth in the world, has recently fallen victim to an alleged data breach. A pro-Palestinian hacker group known as...

The Hackers Choice – 30 years of hacking without trying to get rich!
Alessio Stefan - July 16th, 2024
Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...
Sign up for the newsletter