Red Hot Cyber. The Cybersecurity Blog
Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...
$14.5 billion stolen from LuBian! It’s the largest cryptocurrency theft in history.
In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an attack whose full extent has only now been revealed. ...
What are Remote Access Trojans (RATs): The menacing shadow behind spam emails
Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous b...
0-day/0-click RCE exploit for sale on iOS. Explore the cyberweapons market for espionage.
An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...
Microsoft lists 40 jobs that will disappear thanks to AI. “Hands-on” jobs are holding up.
A new Microsoft study offers a surprising (and disturbing) look at how generative AI is reshaping the global workforce. Contrary to popular belief, it’s not just high-tech professionals who are...
WhatsApp in the crosshairs! At Pwn2Own Ireland 2025, a $1 million prize will be awarded for a zero-click RCE exploit.
Trend Micro’s Zero Day Initiative (ZDI) has announced a reward worthy of a zero-day broker! An unprecedented $1,000,000 reward is being offered to anyone who can develop a zero-click remote cod...
Lovense writes to Red Hot Cyber. The CEO provides clarification on security vulnerabilities.
Regarding our previous article about security bugs discovered in Lovesense devices (a leading company in the field of intimacy technology devices), the company has released an official statement to Re...
What is vibe coding? Let’s discover the new frontier of programming.
“I need a system to manage my church events: volunteers, registration, community event planning.”. Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical en...
AI fever hits Wyoming! A 10-gigawatt data center will consume more electricity than 600,000 people.
The U.S. state of Wyoming, with a population of just under 600,000, could have a data center that consumes more electricity than the state’s entire population. The project, led by energy compan...
VPN usage in the UK increases 1,400% with the UK’s new Online Safety Act.
Across the UK, people are turning to location-blocking virtual private networks (VPNs) to circumvent new national rules on online age verification. Last week, new age verification rules came into forc...
Featured Articles

Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...

In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an attack whose full extent has only now been revealed. ...

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous b...

An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...

A new Microsoft study offers a surprising (and disturbing) look at how generative AI is reshaping the global workforce. Contrary to popular belief, it’s not just high-tech professionals who are...

Stormous claims an attack on NASA
Pietro Melillo - October 9th, 2024
In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Alessio Stefan - September 30th, 2024
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
RHC Dark Lab - September 23rd, 2024
In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on...

Alleged SpaceX Database Breach Published on BreachForums
Pietro Melillo - September 21st, 2024
A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed...
Sign up for the newsletter