Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
LECS 970x120 1

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 351

ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed

Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading brands, including Gucci, Balenciaga, and Alexander McQueen. ShinyHunters, the same...

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the...

Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy

The news is simple, the technology is not. Chat Control (CSAR) was created to uncover CSAM and grooming dynamics within messaging platforms. The "modernized" version forgoes the server-side backdoor and...

Plato, the cave, and social media: are we only looking at shadows?

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search histories, and online interactions, constantly exposed and...

Microsoft accused by Ron Wyden of cybersecurity negligence

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the company of "gross negligence" in the field...

From image theft to deepfakes: the new frontier of digital manipulation

In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen content distributed without consent, but also deepfakes: videos in which...

LockBit 5.0 Hacked Again: XOXO from Prague Strikes Again

A déjà-vu with new implications. In May 2025, the LockBit ransomware collective suffered a severe blow: the defacement of the affiliate panel of version 4.0 by an unknown actor signing...

New AD DS Vulnerability (CVE-2025-21293) Could Hand Hackers the Keys to the Entire Corporate Network

Microsoft recently published a security advisory regarding a new vulnerability affecting Active Directory Domain Services (AD DS). The flaw, identified as CVE-2025-21293, is classified as an Elevation of Privilege vulnerability...

A bug in Google Drive allows access to other people’s files on shared desktops.

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sync files between local and cloud folders....

LockBit 5.0: concrete signs of a possible rebirth?

The ransomware landscape continues to be characterized by dynamics of adaptation and resilience. Even when an international operation seems to spell the end for a criminal group, experience shows us...