Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Redhotcyber Banner Sito 970x120px Uscita 101125

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 274

Qilin leads ransomware attacks as new groups emerge underground

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incidents. According to a recent Cyble report, the...

Qilin Ransomware Strikes Deep into South Korean Finance

Imagine waking up one morning and discovering that your sensitive financial data—contracts, customer lists, investment strategies—is exposed on a hidden site on the dark web, with a timer threatening to...

Will this latest article “against” ChatControl be absolutely useless?

We had already discussed the proposed "ChatControl" regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels...

ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed

Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading brands, including Gucci, Balenciaga, and Alexander McQueen. ShinyHunters, the same...

Plato, the cave, and social media: are we only looking at shadows?

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search histories, and online interactions, constantly exposed and...

Microsoft accused by Ron Wyden of cybersecurity negligence

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the company of "gross negligence" in the field...

From image theft to deepfakes: the new frontier of digital manipulation

In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen content distributed without consent, but also deepfakes: videos in which...

A bug in Google Drive allows access to other people’s files on shared desktops.

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sync files between local and cloud folders....

LockBit 5.0: concrete signs of a possible rebirth?

The ransomware landscape continues to be characterized by dynamics of adaptation and resilience. Even when an international operation seems to spell the end for a criminal group, experience shows us...

Cyberstorage: Italian IT Managers’ Response to Ransomware

Cyberstorage: Italian IT managers' response to increasingly sophisticated ransomware. The landscape has changed in recent years: more aggressive ransomware, data exfiltration before encryption, service interruptions due to physical events and...