Red Hot Cyber. The Cybersecurity Blog
What is vibe coding? Let’s discover the new frontier of programming.
“I need a system to manage my church events: volunteers, registration, community event planning.”. Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical engi...
AI fever hits Wyoming! A 10-gigawatt data center will consume more electricity than 600,000 people.
The U.S. state of Wyoming, with a population of just under 600,000, could have a data center that consumes more electricity than the state’s entire population. The project, led by energy company...
VPN usage in the UK increases 1,400% with the UK’s new Online Safety Act.
Across the UK, people are turning to location-blocking virtual private networks (VPNs) to circumvent new national rules on online age verification. Last week, new age verification rules came into forc...
What is a Bug Bounty and what is a responsible disclosure program?
In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have l...
7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.
While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July 28, 2025, Russ...
Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.
The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These a...
BreachForums is back online! 7.3 million posts and 340,000 users restored.
If weeds aren’t pulled out by the roots, they’ll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the roots of RaidForums! Br...
What is Red Team? A journey into the world of offensive security experts.
The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...
UK: Strict rules for online age verification. Pornhub and YouPorn will comply.
Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...
Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!
During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...
Featured Articles

“I need a system to manage my church events: volunteers, registration, community event planning.”. Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical engi...

The U.S. state of Wyoming, with a population of just under 600,000, could have a data center that consumes more electricity than the state’s entire population. The project, led by energy company...

Across the UK, people are turning to location-blocking virtual private networks (VPNs) to circumvent new national rules on online age verification. Last week, new age verification rules came into forc...

In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have l...

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July 28, 2025, Russ...

Echelon Stealer: The Open Source Malware
Pietro Melillo - July 31st, 2024
Echelon Stealer is an infostealer malware that was first discovered in 2018 and is still active. Currently shared as an open-source tool on GitHub, Echelon Stealer offers various advanced features...

Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages
Redazione RHC - July 29th, 2024
In an incident earlier this month, a Ferrari executive found himself receiving unusual messages that appeared to come from the company's CEO, Benedetto Vigna. The messages came via WhatsApp, owned...

The Ransomware Group Ransomexx Claims Attack on Liteon
Pietro Melillo - July 26th, 2024
On July 26, 2024, the ransomware group Ransomexx publicly claimed responsibility for an attack against Liteon, a giant in the electronic components sector. This attack is further evidence of the...

A Threat Actors Posts Update on Luxottica’s 2021 Data Breach
Redazione RHC - July 25th, 2024
Recently, a threat actor in a clandestine forum posted an update on the 2021 data breach concerning the giant Luxottica, one of the world's largest eyewear companies. According to the...
Sign up for the newsletter