Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
LECS 970x120 1

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 351

Zero Tolerance in Office! Microsoft will block external links in Excel for security reasons.

Microsoft continua a impegnarsi per contrastare i meccanismi potenzialmente pericolosi in Office e Windows annunciando nuove restrizioni in Excel. A partire da ottobre 2025, Microsoft adotterà misure drastiche per isolare...

What is malware? Between science fiction, the lab, and reality.

We often talk about "Malware". But even today, many people don't fully understand the real meaning of this word. With this article, we want to explain precisely what malware is,...

What is vibe coding? Let’s discover the new frontier of programming.

"I need a system to manage my church events: volunteers, registration, community event planning.". Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical engineer, had developed a...

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for use as evidence in a legal context. This field...
cybercognitivismo fabrizio saviano intervista

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent years, ransomware attacks have pushed Italy to third place among...

7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July...

Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.

The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These attacks do...

What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking

Ethical Hacking is a fascinating yet enigmatic discipline. It's a field where ethics and technology merge to defend the digital world. If you're already intrigued by this mysterious world, or...

What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.

How many times have we heard this acronym: CISO? But how many of us don't know precisely what it means or have little in-depth knowledge of what a Chief Information...
Banner di sequestro del dominio XSS.IS con loghi BL2C, SBU ed Europol

XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.

Imagine opening your favorite forum bookmark, like every evening, to find new stealer variants or yet another batch of newly breached credentials. Instead of the usual noticeboard, a banner appears...