Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Desktop

Category: Cybercrime and Darknet

KaruHunters Claims Cyber Attack on RIPE NCC

A post recently appeared on a popular underground forum that’s attracting the attention of the cybersecurity community. A user with the handle KaruHunters , already known for his activities within digital criminal networks, posted an ad claiming to be in possession of compromised data from RIPE NCC (Réseaux IP Européens Network Coordination Centre). Disclaimer: This report includes screenshots and/or text from publicly available sources. The information provided is for threat intelligence and cybersecurity risk awareness purposes only. Red Hot Cyber condemns any unauthorized access, improper dissemination, or misuse of this data. It is currently not possible to independently verify the authenticity of

Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites

A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign. The attacks, which began in April 2025, primarily targeted vulnerable Microsoft Internet Information Services (IIS) servers located in various countries, including India, Thailand, Vietnam, Canada, and Brazil, which were systematically targeted. Organizations managing IIS servers are advised to immediately apply the latest security patches and restrict the types of file uploads allowed, as users of Android and iOS mobile devices are particularly vulnerable to custom APK download pages and iOS app hosting sites disguised as official resources. Their illicit activity focuses on

Computer science is no longer a safe career! What’s changing for students and companies?

For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and businesses face a radically changed landscape, where once-certain career paths have become more challenging, uncertain, and competitive than ever before. The topic was the focus of a recent episode of the podcast Nova’s Particles of Thought , hosted by astrophysicist Hakeem Oluseyi. Among the guests was Hany Farid, a professor of computer science at the University of California, Berkeley, who discussed how the field has changed in just a few years. Farid explained that, until four years ago, the widespread belief was that a

China cracks down on fake news generated by artificial intelligence

The Cyberspace Administration of China has announced the launch of a two-month nationwide campaign, which began on July 24 , aimed at countering the spread of false information published by so-called self-media . The initiative, titled “Clear and Clean: Correcting ‘Self-Media’ from Publishing False Information,” aims to regulate the functioning of these platforms, cracking down on malicious manipulation, distortion of facts, and misleading speculation. Disinformation and artificial intelligence One of the program’s central aspects involves the use of artificial intelligence to create synthetic content, impersonate other people, or fabricate fake news related to sensitive social issues. In recent years, the rapid development

China under surveillance: Users sanctioned for spreading fake news online

In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users responsible for spreading false information that has disrupted public order. Talk about new energy vehicles and tourism in Hainan A user identified as Su Moumou posted online claims that electric vehicles would be unable to cross the sea to Hainan without a ticket, adding that “no one will come to Hainan this winter.” The authorities’ investigation found that the information was distorted and spread with the intent of attracting attention, creating alarm among residents and tourists. Fake ads about Sanya casino User Song took

Asahi Group under hacker attack: beer supplies at risk

Last Monday, Asahi Group, Japan’s largest beer, whisky, and soft drink maker, temporarily suspended its operations in Japan following a cyberattack that compromised its systems , including order processing, shipping, and call centers. The company is known for products such as Super Dry beer and Nikka whisky. On Wednesday, employees began manually processing orders, visiting customers in person and recording requests on paper . To focus resources on shipping existing orders, Asahi temporarily suspended accepting new alcohol orders, while continuing to accept requests for food and non-alcoholic beverages. The first batch of manual orders was shipped on Friday. “There are currently no

Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted

A new malicious campaign is using Facebook as a vehicle to spread Datzbro , an Android malware that combines the features of a banking Trojan with those of spyware. The alarm comes from an analysis published by Malwarebytes , which highlights how attackers have chosen to target groups frequented by elderly people , considered more vulnerable to digital scams. An insidious hybrid malware Datzbro integrates the functionality of both an infostealer and a financial Trojan . On the one hand, it collects personal data and monitors the victim’s online activity; on the other, it can interfere with banking transactions, allowing criminals to

100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!

Vulnerability bounty platform HackerOne reported that white hat hackers worldwide received $81 million in compensation over the past 12 months. According to the company, this represents a 13% increase over the previous year. Today, HackerOne manages over 1,950 bug bounty programs and provides vulnerability disclosure, penetration testing, and code security auditing services. Its clients include Anthropic, Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and government agencies, including the U.S. Department of Defense. On average, active programs pay researchers about $42,000 annually . The top 100 programs on the platform alone paid out a total of $51 million between July 2024 and June

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media

The Red Hot Cyber Community had the opportunity to participate in “Beyond the Screen,” the Postal Police’s important initiative for young people on October 2nd , with the aim of encouraging them to experience reality beyond the confines of social networks . This event confirms how, for several years now, cybersecurity awareness has become a fundamental pillar of youth training. Rome’s Auditorium Parco della Musica , packed with over 1,200 students from the capital and its province , hosted the meeting promoted by the State Police, in collaboration with Google and One More Pictures . The initiative is part of the 13th

They’re offering you €55,000 for access to your office account. What should you do?

BBC journalist Joe Tidy found himself in a situation usually hidden in the shadows of cybercrime. In July, he received an unexpected message on the messaging app Signal from an unknown person who identified themselves as ” Syndicate .” The person offered to participate in a criminal scheme: if Tidy gave up access to his computer, he would receive a portion of the ransom demanded by the company . Initially, the offer was 15% of the available amount, but later increased to 25%, with the promise that this “deal” would be enough to live comfortably. The criminals explained their interest in the