Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

- July 3rd, 2025 - (Posted in Hacking revolution)
The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic humor, of memes, but above all culture, engineering and science. But while Linux has its penguin, BSD has its daemon and Perl His camel, what has always...

He died because of ransomware! Another victim joins the list

- June 26th, 2025

This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article "I deferichò per il ransomware....

  

A new fileless infostealer is being spread by Telegram and legitimate services

- June 26th, 2025

TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified...

  

Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!

- June 26th, 2025

Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with the identifier CVE-2025-6543 and affects the popular NetScaler ADC...

  

Fox Kitten and Br0k3r: The Iranian Cyber Contractor Collaborating with Ransomware Gangs

- June 26th, 2025

We continue our series of articles on IABs by writing about an Iranian cyber contractor that not only works as an initial access broker but also provides support to ransomware...

  

Sign up for the newsletter