Red Hot Cyber. The Cybersecurity Blog
What is a Bug Bounty and what is a responsible disclosure program?
In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have l...
7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.
While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July 28, 2025, Russ...
Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.
The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These a...
BreachForums is back online! 7.3 million posts and 340,000 users restored.
If weeds aren’t pulled out by the roots, they’ll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the roots of RaidForums! Br...
What is Red Team? A journey into the world of offensive security experts.
The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...
UK: Strict rules for online age verification. Pornhub and YouPorn will comply.
Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...
Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!
During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...
What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a Chief Information Security Officer does? This p...
SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These a...
ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers...
Featured Articles

In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have l...

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July 28, 2025, Russ...

The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These a...

If weeds aren’t pulled out by the roots, they’ll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the roots of RaidForums! Br...

The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale
Raffaela Crisci - July 24th, 2024
IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of billions. This announcement was made public through a post on...

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”
Redazione RHC - July 24th, 2024
Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to have exposed the names, departments, and emails of 3,379 Spanish...

The other side of cybersecurity: stress and burnout are “by design” in domain experts
Redazione RHC - July 23rd, 2024
We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important point in the profession of the...

Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.
Redazione RHC - July 23rd, 2024
Elon Musk, who simultaneously heads six innovative companies-Tesla, SpaceX, Starlink, X (formerly known as Twitter), Neuralink, and xAI-is not stopping there. He recently announced that xAI has begun training its...
Sign up for the newsletter