Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Di Redazione RHC - 04/08/2025

Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...

$14.5 billion stolen from LuBian! It’s the largest cryptocurrency theft in history.
Di Redazione RHC - 04/08/2025

In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an attack whose full extent has only now been revealed. ...

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails
Di Redazione RHC - 03/08/2025

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous b...

0-day/0-click RCE exploit for sale on iOS. Explore the cyberweapons market for espionage.
Di Redazione RHC - 01/08/2025

An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...

Microsoft lists 40 jobs that will disappear thanks to AI. “Hands-on” jobs are holding up.
Di Redazione RHC - 01/08/2025

A new Microsoft study offers a surprising (and disturbing) look at how generative AI is reshaping the global workforce. Contrary to popular belief, it’s not just high-tech professionals who are...

Stormous claims an attack on NASA

- October 9th, 2024

In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

  

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)

- September 30th, 2024

Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...

  

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy

- September 23rd, 2024

In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on...

  

Alleged SpaceX Database Breach Published on BreachForums

- September 21st, 2024

A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed...

  

Sign up for the newsletter