Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Enterprise BusinessLog 970x120 1

Author: Alessio Stefan

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...
Share on Facebook Share on LinkedIn Share on X

Paragon Spyware – Let’s talk about privacy and governments

Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the...
Share on Facebook Share on LinkedIn Share on X

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....
Share on Facebook Share on LinkedIn Share on X

FBI responds to threats and announcement of LockBit 4.0

In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of the 4.0 program of the most famous RaaS in the...
Share on Facebook Share on LinkedIn Share on X

The Story Of Conti Ransomware – The War Within (Episode 2)

This is a continuation of the Conti story. You can read the previous part, which covered the group's origins, in the previous article. We will now explore the internal components...
Share on Facebook Share on LinkedIn Share on X

Herm1t Interview – From VX Heaven to the war gates!

This is the story of Herm1t, founder of VX-Heaven, hacker - currently active in protecting Ukraine from 2014 -  and founder of RUH8 in fall 2015, told by means of...
Share on Facebook Share on LinkedIn Share on X

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)

Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...
Share on Facebook Share on LinkedIn Share on X

Donald Trump’s campaign under attack! Documents and internal communications exfiltrated

After the European elections unfolded, geopolitical attentions shifted to the U.S. election campaign, one of the most dynamic in recent years recently with the Democrats' recent changeover with Harris as...
Share on Facebook Share on LinkedIn Share on X

NSO Group targeted! BlackMeta attacks Spyware maker’s central domain

The Pro-Palestinian group BlackMeta (or DarkMeta) announced on August 1, 2024, on their official telegram channel that they conducted a destructive attack on the NSO group's infrastructure, including the central...
Share on Facebook Share on LinkedIn Share on X

The Hackers Choice – 30 years of hacking without trying to get rich!

Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...
Share on Facebook Share on LinkedIn Share on X