Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Crowdstriker 970×120

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 274

We’re All in the Truman Show! Cybersecurity Lessons from Seahaven Cyber Prison

The 1998 film "The Truman Show" is a terrifying premonition of the dangers of pervasive surveillance, algorithmic manipulation, and the erosion of consensus in a modern context of digital interconnection....

AI Alignment: Where Does AI Learn Right and Wrong?

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn't one of...

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge

While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet Explorer Mode (IE Mode) in Edge , which was designed...
Foto: Ufficio Stampa Italian Tech Wee

Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”

Data centers in space, lunar landers, Martian missions: the future designed by Bezos in Turin. But the real revelation is the anecdote about his grandfather that reveals his human profile....

Towards “legal technology”: legal education in the digital age must be technological.

As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of legal informatics in Italy, I constantly reflect on the state...

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectual property and the industrial secrets that...

Velociraptor used in active attacks to distribute LockBit and Babuk ransomware

Hackers have begun using Velociraptor , the digital forensics and incident response (DFIR) tool, to launch LockBit and Babuk ransomware attacks. Cisco Talos researchers attribute these campaigns to the Storm-2603...

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks

Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for a series of large-scale attacks that resulted in the theft...

Securing WebSocket Connections: Risk, Analysis, and Practical Measures

WebSockets offer persistent two-way communication between client and server, essential for real-time applications like chat, gaming, dashboards, and notifications. However, this persistence introduces specific attack surfaces: if the channel or...

WhatsApp Alert: New Malware Spreads Like a Virus Among Contacts

Trend Micro researchers have detected a large-scale malware campaign targeting users in Brazil. It is distributed via the desktop version of WhatsApp and is characterized by a high infection rate....