Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Precedente Successivo

Ultime news

Threat Actor 888 Claims Compromise of BMW (Hong Kong) Customers Cybercrime

Threat Actor 888 Claims Compromise of BMW (Hong Kong) Customers

Recently, a concerning news story has emerged in the world of cybersecurity. A well-known hacker, identified by the nickname 888,...
Pietro Melillo - 15 July 2024
RHC interviews Ransomcortex, the gang targeting Hospitals. “pay the ransom, we won’t even spare the CEO’s family.” Cybercrime

RHC interviews Ransomcortex, the gang targeting Hospitals. “pay the ransom, we won’t even spare the CEO’s family.”

Ransomcortex is a new cyber ransomware gang that resonates menacingly in the healthcare sector. This group has quickly attracted attention...
RHC Dark Lab - 15 July 2024
Threat Actors IntelBroker Release Alleged Equifax Data on Underground Forum Cybercrime

Threat Actors IntelBroker Release Alleged Equifax Data on Underground Forum

Recently, a threat actor in an underground forum published an alleged data breach. This incident was revealed by a user...
RHC Dark Lab - 13 July 2024
Hospitals tremble! Ransomcortex arrives. ransomware gang targeting healthcare facilities Cybercrime

Hospitals tremble! Ransomcortex arrives. ransomware gang targeting healthcare facilities

Recently, the landscape of cyber threats has been enriched by the emergence of a new ransomware group named "Ransomcortex". This...
RHC Dark Lab - 12 July 2024
RHC interviews Vanir Group. Former affiliates of LockBit, Karakurt and Knight united to extort money: ‘Hire professionals, don’t be cheap’ Cybercrime

RHC interviews Vanir Group. Former affiliates of LockBit, Karakurt and Knight united to extort money: ‘Hire professionals, don’t be cheap’

New threat actors often emerge every day to destabilize the digital foundations of organizations around the world. One of the...
RHC Dark Lab - 12 July 2024
End of an Era: SiegedSec, the Hacker Group, Announces Its Dissolution Cybercrime

End of an Era: SiegedSec, the Hacker Group, Announces Its Dissolution

The cybercriminal group SiegedSec, which gained notoriety during Russia's invasion of Ukraine, has recently announced its dissolution. This group, led...
Pietro Melillo - 11 July 2024

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…

Immagine del sitoCybercrime
149 Million Accounts Exposed: The Database No One Should Have Seen
Redazione RHC - 26/01/2026

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…

Immagine del sitoCybercrime
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules
Marcello Filacchioni - 26/01/2026

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…

Immagine del sitoCyber News
How a simple Visual Studio Code file can become a backdoor for state-run hackers
Redazione RHC - 26/01/2026

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…