Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
970x20 Itcentric

Author: Luca Stivali

Alleged EY Data Leak: 4TB of SQL Backups Exposed on Azure Cloud

In recent days, the alleged data leak by Ernst & Young (EY) has become one of the most discussed topics in the international cybersecurity landscape. I decided to reconstruct the story step by step, starting from the technical evidence shared by Recorded Future and the analysis by Neo Security , to understand not only how the exposure occurred, but also what it can teach us about the control of digital assets in complex cloud environments like EY’s. The file, in .BAK format, was accessible without authentication and may have contained sensitive information , such as API keys, service credentials, and authentication tokens.

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of Large Language Models (LLMs), integrated directly into the technical workflow. One of the most interesting examples is LLM-Tools-Nmap , presented by Hackers Arise , which allows you to drive Nmap via natural language instructions . In practice, the template translates the request (“scan the most common web ports on this /24 at a moderate speed and output to XML”) into a correct and safe Nmap command, including timing options, NSE scripts, and

Alert: Thousands of Italian websites at risk! 526,000 sites and 6,500 databases for sale on the Darkweb

A new post on the dark web offers full access to thousands of MySQL servers and databases owned by Italian shared hosting providers. In the last few hours, a new thread appeared on an underground forum with the unequivocal title: “Italian hosting service sites – 9 more 40 servers – 526193 site’s backup – 4631 hosting customer – 6546 MySQL db’s”. Disclaimer: This report includes screenshots and/or text from publicly available sources. The information provided is for threat intelligence and cybersecurity risk awareness purposes only. Red Hot Cyber condemns any unauthorized access, improper dissemination, or misuse of this data. It is currently

Major DarkForums Leak: 196 Italian Sites Exposed with Clear FTP Credentials

On September 20, 2025, at 11:52 PM, a thread titled “FRESH FTP LEAK” appeared on DarkForums , posted by user Hackfut . The material allegedly exposed access to FTP servers distributed across several countries, including Italy , the Netherlands, the Philippines, Peru, Chile, Australia, and Latvia. The targets included companies, schools, hospitality facilities, event sites, e-commerce sites, and media outlets . The dump’s contents consist of hostnames/FTP domains, usernames, and passwords in clear text . Unfortunately, the critical issue for our country is the significant number of Italian domains present within the collection, which is made available free of charge to users

LockBit 5.0 Hacked Again: XOXO from Prague Strikes Again

A déjà-vu with new implications. In May 2025, the LockBit ransomware collective suffered a severe blow: the defacement of the affiliate panel of version 4.0 by an unknown actor signing themselves “XOXO from Prague”, accompanied by the leak of an SQL database containing chats, wallets, and affiliate data. At that time, LockBitSupp had even offered a reward for anyone who provided information about the author. Over the past 24 hours, the scene has repeated itself, but with a significant twist: this time, not just a public deface, but an internal compromise of the 5.0 build panel. The leaked screenshots show the Linux

7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July 28, 2025, Russia’s national airline Aeroflot was hit by a massive cyberattack claimed by pro-Ukrainian groups Silent Crow and Cyberpartisans BY, causing flight cancellations, a direct financial impact on the stock market, and – according to underground sources – the compromise and destruction of over 7,000 internal servers. The attack represents one of the most devastating offensive operations suffered by Russian critical infrastructure since the beginning of the conflict with Ukraine. The

Banner di sequestro del dominio XSS.IS con loghi BL2C, SBU ed Europol

XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.

Imagine opening your favorite forum bookmark, like every evening, to find new stealer variants or yet another batch of newly breached credentials. Instead of the usual noticeboard, a banner appears with three prominent logos: the French Brigade for the Fight against Cybercrime, the Ukrainian Cyber Intelligence Department, and Europol. Below, a blunt text: “This domain has been seized.” Thus the curtain fell on XSS.IS, the clandestine auction room that for twelve years brought malware developers, access brokers, and ransomware affiliates together. What follows is not just the story of a dawn raid: it is the The story of a timed investigation that,

Rivendicato un databreach a Deloitte: credenziali GitHub e codice sorgente finiscono sul dark web

Un attacco informatico ai danni di Deloitte è stato rivendicato dal threat actor “303”, che ha pubblicato su un noto forum underground un post con il titolo inequivocabile: “Deloitte.com Source Code + Internal GitHub Credentials – leaked, download!”. Disclaimer: Questo rapporto include screenshot e/o testo tratti da fonti pubblicamente accessibili. Le informazioni fornite hanno esclusivamente finalità di intelligence sulle minacce e di sensibilizzazione sui rischi di cybersecurity. Red Hot Cyber condanna qualsiasi accesso non autorizzato, diffusione impropria o utilizzo illecito di tali dati. Al momento, non è possibile verificare in modo indipendente l’autenticità delle informazioni riportate, poiché l’organizzazione coinvolta non ha ancora rilasciato un

Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data

At 14:35 today, the claim of a cyber attack on the consulting giant Deloitte was detected on BrainChiper’s Data Leak Site. A countdown is active, marking the time for the publication of the data, which according to the cybercriminals will take place in 10 days and 20 hours. At present, we cannot confirm the authenticity of the news, as the organisation has not yet published an official statement on its website about the incident. The information reported comes from public sources accessible on underground sites, so it should be interpreted as a source of intelligence and not as definitive confirmation. The post

The Exploit for the RCE on Palo Alto Firewalls is now Online! And let the Administration be for all

A few hours ago on Breach Forum, a threat actor by the name “newplzqibeme” shared a GitHub repository where a python-written exploit for active exploitation of CVE-2024-0012 on PanOS (the Palo Alto firewall operating system) is published. The exploit grants the attacker, full administrative access to the firewall with an Authentication Bypass mechanism, gaining administrator access. The post by “newplzqibeme” shows two public IPs as examples, which are most likely exposed and vulnerable firewalls. Firewalls running PanOS 10.2, 11.0, 11.1 and 11.2 are affected by this CVE if not upgraded to the respective versions (>= 10.2.12-h2, >= 11.0.6-h1, >= 11.1.5-h1 and >=