Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Redhotcyber Banner Sito 970x120px Uscita 101125

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 351

Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin

In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, rewards in cryptocurrencies.A...

How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models

In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in understanding and generating natural language. However, behind the scenes,...

A study shows a shocking truth: 98.5% of passwords are weak!

In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted from a list of over...

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of patients...

What was the first ransomware in history? Discovering Trojan AIDS

We often talk about ransomware on Red Hot Cyber and criminal cyber gangs. But who invented this dangerous cyber blackmail "weapon"? Today, ransomware attacks have become familiar to most people,...

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...

After Encrypting Half the World, Hunters International Shuts Down! Decryptor Distributed for Free

Hunters International, the group responsible for one of the largest ransomware attacks in recent years, has officially announced the cessation of its operations. In a statement published on its darknet...

Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package”

The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team of lawyers, so that they could put pressure on the...

AKIRA emergency report: the ransomware that is breaching Italy

Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow one another, one fact emerges glaringly: AKIRA has entered the...