Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Redhotcyber Banner Sito 970x120px Uscita 101125

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 350

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...

Discovering DarkSide: Techniques, Tactics, and Affiliations

Researchers across the cyber community have been exchanging a great deal of information lately about the DarkSide ransomware cyber gang, the emerging cybercriminal group that has suddenly risen to global...

Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.

Many people believe that accessing only HTTPS sites is enough to ensure security when browsing on unsecured Wi-Fi networks. Spoiler alert: this belief is also a false sense of security....

Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?

It's often thought that avoiding online dangers is as simple as not making payments or entering credentials while browsing. This approach, while seemingly prudent, is profoundly flawed for several reasons—especially...

Protecting your WiFi by hiding the name? This is a false sense of security

Security, especially when it comes to WiFi networks, is often the subject of misunderstandings and clichés. In this series of articles in our WiFI column , we aim to debunk...

Open WiFi Networks: A Fertile Ground for Cybercrime

Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing indispensable. This in-depth look at Wi-Fi focuses on a widely...

The Accident That Liberated Generative AI. An Analysis of the “Plane Crash” Prompt

A plane crashes in a snowy forest. Some of the passengers survive, others do not. The survivors are starving, desperate, and find refuge in a village cut off from the...

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We're not just talking about scams or...

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In...

Cyber Incident Mitigation Guide: The First Steps

By definition, a security incident occurs when a computer system, network, or the data contained within them is compromised, breached, or damaged by malicious or unauthorized activity. These incidents can...