Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia Cyber News

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia

[Singapore; 11 June, 2025] Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today...
Sandro Sana - June 11, 2025
RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series Cybercrime

RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series

On May 10, 2025, the City of Pisa suffered a ransomware attack within their computer systems. The next day Nova...
RHC Dark Lab - June 2, 2025
Bringing Your Imagination to Life: AI-Generated Images from Your Description innovation

Bringing Your Imagination to Life: AI-Generated Images from Your Description

Remember when you had a vivid image in your mind but struggled to describe it to someone else? Maybe it...
Ashleigh Crause - May 14, 2025
Why Europe’s healthcare sector must build resilience to fight the threat of ransomware Culture

Why Europe’s healthcare sector must build resilience to fight the threat of ransomware

Author: Andrea Nicelli, Head of Italy and Spain at Resilience Italy’s critical infrastructure is highly exposed to cyber threats, ranking...
Olivia Terragni - April 13, 2025
The Evil Purr – DarkLab Interview to HellCat Ransomware! Cybercrime

The Evil Purr – DarkLab Interview to HellCat Ransomware!

HellCat ransomware appeared in the second half of 2024 with and it has attracted the attentions of analysts thanks to...
RHC Dark Lab - March 30, 2025
VanHelsing RaaS: An Expanding Ransomware-as-a-Service Model Cybercrime

VanHelsing RaaS: An Expanding Ransomware-as-a-Service Model

The ransomware threat landscape is constantly evolving, with increasingly structured groups adopting sophisticated strategies to maximize profits. VanHelsing is a...
Pietro Melillo - March 22, 2025
NIST selects second PQC Key Encapsulation algorithm innovation

NIST selects second PQC Key Encapsulation algorithm

The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected...
Tara Lie - March 18, 2025
Paragon Spyware – Let’s talk about privacy and governments Cyberpolitics

Paragon Spyware – Let’s talk about privacy and governments

Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction...
Alessio Stefan - March 18, 2025
Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System Cyberpolitics

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System

The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025...
Olivia Terragni - March 18, 2025
Babuk Locker 2.0: The New Ransomware Affiliate Program Cybercrime

Babuk Locker 2.0: The New Ransomware Affiliate Program

Babuk, one of the most notorious ransomware groups in cybercrime, has launched the Babuk Locker 2.0 Affiliate Program 2025, an...
Pietro Melillo - March 13, 2025
NightSpire: A New Player in the Ransomware Landscape Cybercrime

NightSpire: A New Player in the Ransomware Landscape

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we...
Pietro Melillo - March 12, 2025
Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction Cybercrime

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction

In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber's DarkLab threat...
Pietro Melillo - March 10, 2025

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems

According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass...

$200 for Access to an Italian Company! While the Dark Web is doing business, are you ready to defend yourself?

Following the case of the 568 endpoints of an Italian industrial machinery company, another compromised access related to an Italian software engineering company has ended up for sale on an underground forum...

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. "The goal of this initiative is to provide the best set of...
Cyberspazio: il filo invisibile tra guerra e pace

Cyberspace: The Invisible Thread Between War and Peace

How Iran-Israel’s Digital War Redefines Security, Diplomacy, and the Global Future? Since June 12, a 700% increase in cyber activity has been detected, resulting in a wave of DDoS attacks,...

Cloudflare Mitigates 7.3 Terabits Per Second Attack. Imagine 9350 HD Movies Downloaded in 45 Seconds

In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: 7.3 terabits per second (Tbps). This event comes shortly after the release of the DDoS Threat Report for Q1...

Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks

Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effective tools for encrypting traffic and preventing data...
sicari a pagamento

Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe

A worrying criminal trend is taking hold in Europe: criminal gangs are using encrypted apps to recruit teenagers as young as 14 to commit violent crimes, including contract killings. These...
Fumetto sul cyberbullismo di Red Hot Cyber

“Byte The Silence”: RHC’s Free Shock Comic About Cyberbullying Out Today!

Today, June 23, 2025, "Byte The Silence" is released, the new comic about cyberbullying created by Red Hot Cyber, is available from today for free in electronic format, on our...

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain

This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding...

Connected and Vulnerable: How to Secure OT and ICS in 2025

In today's interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE