Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x120 Olympous

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 351

New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!

The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists and clients. On August 30, a message appeared on the...

LockBit 5.0: Signs of a New and Possible “Rebirth”?

LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Following the international operation...

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to establish decision-making strategies that, in every sector, can...

Palo Alto Networks Also Compromised via Salesforce and Drift

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some...

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely...

Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login

At the end of August 2025, a high-impact vulnerability affecting HikCentral Professional, the Hikvision platform used to centrally manage video surveillance and access control, was disclosed. The flaw, classified as...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats

Zscaler's recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to...

The new cybersecurity battlefield? Your brain!

Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the humanities, with a focus on coaching. Each week, we'll tackle...

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What happens...