Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Heliaca 970x120 1

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 274

The Gentlemen Ransomware: An Emerging Dark Web Threat Analysis

In Q3 2025, a new ransomware group, identified as The Gentlemen, was observed launching its own Data Leak Site (DLS) on the Tor network. The group's infrastructure and operational methods...

It’s Not Your PC’s Weak Link, It’s Your Mind: Exercises to Defend Yourself from Hackers

Welcome to our second installment! Last week, we explored the battlefield of the human mind, understanding how the coevolution of hackers and defenders is a game of psychological chess, and...

Italian call center companies leave all audio recordings online

Italian companies that use online telephony platforms (VoIP) based on open-source software such as Asterisk and Vicidial rely on these systems to contact Italian citizens on a daily basis, offering...

Toha Arrest: The Future of the Black Market After XSS Shuts Down

The arrest of the alleged administrator of the Russian-language forum XSS[.]is, nicknamed Toha, has become a turning point for the entire black market. According to law enforcement, on July 22,...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the...

The European Union General Court “upholds” the transfer of personal data to the United States. For now

April 1st wasn't an April Fool's joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on the appeal filed for the...

Netshacker: Retrogaming e Hacking Reale su Commodore 64

In the Commodore 64 gaming landscape, Netshacker stands out as a project that challenges the conventions of modern gaming, taking gamers back to the roots of 1980s home computing. This...

CISO vs. DPO: Collaboration or Cold War in Business?

Managing security is far from simple, it's not something that can be standardized, and above all, it can't be achieved through "solutions." It requires planning, analysis, and the ability to...

New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!

The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists and clients. On August 30, a message appeared on the...

LockBit 5.0: Signs of a New and Possible “Rebirth”?

LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Following the international operation...