Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Crowdstriker 970×120

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 358

Smartphones rented without your knowledge: Google dismantles a global proxy network

Android has never been so exploited, at least according to the latest developments reported by a recent investigation. Google announced that it has dismantled what may be the largest network...

Beware of “I am not a robot”: the malware trap that uses Google Calendar.

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that...

WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals

The WinRAR security flaw, which emerged last summer, has become more widespread than expected. Several organizations, both common criminals and nationally funded APT groups, are actively exploiting this vulnerability, as...

Nike investigates alleged hack: “1.4 TB of data stolen”

Nike has launched an investigation following claims by the hacker group World Leaks that it had access to information stolen from its systems. "We always take customer privacy and data...

A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news...

149 Million Accounts Exposed: The Database No One Should Have Seen

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah...

When Malware Hides in Videos! The PixelCode Technique Breaks the Rules

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into...

The Thin Red Line of Criminal Liability in Cybersecurity

This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the current regulatory framework. In this first installment, we will analyze...

LockBit 5.0 Ransomware: New Threats and Advanced Tactics

The LockBit group, which many had quickly dismissed after high-profile failures and leaks, unexpectedly returned to the scene. In the fall of 2025, it unveiled a new version of its...

Cybersecurity in Local Administrations: The Hidden Risk

There's a convenient misconception in Italy: thinking that cybersecurity is a matter for ministries or large strategic players. It's reassuring. And it's wrong. In the real design of public connectivity,...