Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Fortinet 970x120px

Tag: cybersecurity

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain

This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding human relational dynamics can offer us valuable tools to defend ourselves in the complex digital landscape. Forget the image of the hacker who breaks down doors. The cyber threat landscape of 2025 is dominated by a much more insidious strategy, borrowed directly from the darkest dynamics of human psychology: breadcrumbing. Think of it as a skilled fisherman’s technique: he doesn’t cast a huge net, but casts small, tempting baits—breadcrumbs—to keep fish within

NIST selects second PQC Key Encapsulation algorithm

The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to the previously selected ML-KEM (based on CRYSTALS-Kyber). HQC, or “Hemming Quasi-Cyclic” in full, is a code-based KEM which utilises the cryptographically challenging Quasi-Cyclic Syndrome Decoding Problem as its base and built around the concept of error-correcting codes. NIST has stated that they have selected HQC as a backup algorithm to ML-KEM, which utilises a different mathematical approach. ML-KEM is a modular lattice-based algorithm which was first selected by NIST in 2022, and

A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber’s threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang never monitored before: Skira. Ransomware groups generally operate under the logic of “double extortion”: after gaining unauthorized access to an organization’s IT systems, they encrypt the data and simultaneously steal a copy. If the victim refuses to pay the ransom, the cybercriminals threaten not only to leave the systems inaccessible but also to publish the exfiltrated data. Skira fits into this scenario as a newly emerging group that, like many of its