Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Cyber Offensive Fundamentals 970x120 V0.1

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 274

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to establish decision-making strategies that, in every sector, can...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats

Zscaler's recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to...

The new cybersecurity battlefield? Your brain!

Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the humanities, with a focus on coaching. Each week, we'll tackle...

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What happens...

Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages

The "Tea Dating Advice" app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 13,000 selfies and documents uploaded for account...

LilyGO T-Embed CC1101 and Bruce Firmware, the community makes studying Rolling Code possible

Research into radio frequency security never stops. In recent years, we've seen the emergence of increasingly accessible tools that have brought the world of RF hacking beyond academic laboratories. One...

DarkMirror H1 2025 Released: Dark Lab’s Ransomware Threat Report

Ransomware continues to represent one of the most pervasive and damaging threats in the global cybersecurity landscape. In the regular "DarkMirror" report produced by Red Hot Cyber's DarkLab intelligence laboratory,...

Storm-0501: When Ransomware Moves to the Cloud

Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more "traditional" attacks on on-premise machines, no more ransomware that encrypts local files. Now the threat is moving...

Stagershell: When malware leaves no trace. Malware Forge analysis.

In early 2025, an Italian organization found itself the victim of a sneaky intrusion. No dramatic exploit, no textbook attack. What opened the door to the attackers was a VPN...