Red Hot Cyber. The Cybersecurity Blog

Stormous claims an attack on NASA
In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including government entities and technology companies. On October 5, 2024, information

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to disrupt networks around the globe, once lock out you can

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on their Data Leak Site (also available in the clearnet). Lynx’s

Alleged SpaceX Database Breach Published on BreachForums
A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed data leak from SpaceX, the aerospace company owned by Elon

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!
Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named “l33tfg,” asserts that sensitive information from the White House’s official website has been

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”
Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage or illustrious ruler. The Qilin ransomware is a prime example of the growing

RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series
RHC Dark Lab - June 2nd, 2025
On May 10, 2025, the City of Pisa suffered a ransomware attack within their computer systems. The next day Nova claimed the attack and on the 21st of the same...

Rivendicato un databreach a Deloitte: credenziali GitHub e codice sorgente finiscono sul dark web
Luca Stivali - May 30th, 2025
Un attacco informatico ai danni di Deloitte è stato rivendicato dal threat actor “303”, che ha pubblicato su un noto forum underground un post con il titolo inequivocabile: “Deloitte.com Source Code +...

Digital Anonymity in Danger! What is the European Union deciding?
Alessio Stefan - May 15th, 2025
In recent years, political attention has expanded beyond the national borders of different states. Since the now outdated pandemic caused by COVID-19 and the (re)emergence of different conflicts in different...

Bringing Your Imagination to Life: AI-Generated Images from Your Description
Ashleigh Crause - May 14th, 2025
Remember when you had a vivid image in your mind but struggled to describe it to someone else? Maybe it was a character from a dream, a breathtaking landscape, or...
Sign up for the newsletter