Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Fortinet 970x120px

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 274

Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums

Author : Inva Malaj and Raffaela Crisci 04/10/2025 – Darkforums.st: “303” Claims 9GB Data Breach on Apple.com In the early hours of October 4, 2025, a data breach claim emerged...

SoopSocks: The PyPI Package That Looked Like a Proxy But Was a Backdoor to Windows

The story of SoopSocks is one we, unfortunately, know well: a PyPI package that promises utility — a SOCKS5 proxy — but in reality introduces a well-orchestrated malicious implementation ....

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media

The Red Hot Cyber Community had the opportunity to participate in "Beyond the Screen," the Postal Police's important initiative for young people on October 2nd , with the aim of...

Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).

Every time Brussels churns out a new acronym, someone in the company snorts: "More paper?" It happens. But the Data Act isn't just a stamp to add to the binder:...

Discovering Prompt Injection: When AI Gets Fooled by Words

Generative Artificial Intelligence (GenAI) systems are revolutionizing the way we interact with technology, offering extraordinary capabilities in the creation of text, images, and code. However, this innovation brings with it...

The “non-sensitive data” trap: the costly mistake for companies

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This is the belief that there's...

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective mental block....

TOR Anonymizer v3.0: Advanced Digital Privacy Protection

In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become a primary necessity for journalists, activists, and researchers. It is...

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shouldn't do...

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial significance when discussing cybersecurity....