This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable...
In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...
Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into prestigious companies while...
This is the story of Herm1t, founder of VX-Heaven, hacker - currently active in protecting Ukraine from 2014 - and founder of RUH8 in fall 2015, told by means of...
IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management IntroductionThe recent acquisition of BreachForums by IntelBroker marks a significant shift in the landscape of cybercrime. This transition of...
If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in...
Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...
July 6, 2024: A well-known user of the BreachForums, IntelBroker, has recently announced the sale of a collection of crypto-related documents stolen from Europol's EPE platform. The data breach, which...
A cyber incident has hit Ticketmaster, with a malicious actor issuing a ransom demand, threatening to release sensitive data unless a payment of $2 million USD is made. The hacker...
Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist,...