Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Redhotcyber Banner Sito 970x120px Uscita 101125

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 350

LockBit 5.0 — the cross-platform ransomware that targets hypervisors

In September 2025, a new incarnation of the notorious LockBit ransomware emerged, dubbed LockBit 5.0. It's not just an "update": it's an operational adaptation designed to be faster, less noisy,...

TOR Anonymizer v3.0: Advanced Digital Privacy Protection

In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become a primary necessity for journalists, activists, and researchers. It is...

Fake Microsoft Teams installer! One-time certificates and a backdoor in the download

In recent days, a malvertising campaign targeting business users trying to download Microsoft Teams has been discovered. At first glance, the attack seems trivial: a sponsored ad leads to a...

NIST Towards Post-Quantum Cryptography

NIST , through its National Cybersecurity Center of Excellence (NCCoE) , has released the first draft of a new document dedicated to post-quantum cryptography (PQC) . Cryptographic algorithms have always...

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shouldn't do...

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial significance when discussing cybersecurity....

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...

Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.

On September 20, 2025, a cyberattack hit three of Europe's major airports: London Heathrow, Brussels, and Berlin. The digital systems governing check-in and baggage handling were rendered unusable, resulting in...

From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches

I have been working for several years as a System Engineer, and one of the tasks I handled was managing Citrix PVS. One of the issues with PVS was investigating...

Cyberwar in Italy: The government brings the army into cyberspace.

Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by...