Red Hot Cyber. The Cybersecurity Blog

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to disrupt networks around the globe, once lock out you can

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on their Data Leak Site (also available in the clearnet). Lynx’s

Alleged SpaceX Database Breach Published on BreachForums
A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed data leak from SpaceX, the aerospace company owned by Elon

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!
Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named “l33tfg,” asserts that sensitive information from the White House’s official website has been

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”
Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage or illustrious ruler. The Qilin ransomware is a prime example of the growing

Navigating the future: a dialogue on human resilience and preservation
Participants: NewPlato: Greetings, esteemed colleagues. Today, we embark on a profound dialogue about the future of humanity, particularly focusing on the cyclical nature of civilizations and the means to preserve our collective well-being. NewAlcibiades, you’ve projected significant challenges around the

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia
Redazione RHC - June 11th, 2025
[Singapore; 11 June, 2025] Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today that it has contributed to INTERPOL’s “Operation Secure”, which took...

RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series
RHC Dark Lab - June 2nd, 2025
On May 10, 2025, the City of Pisa suffered a ransomware attack within their computer systems. The next day Nova claimed the attack and on the 21st of the same...

Rivendicato un databreach a Deloitte: credenziali GitHub e codice sorgente finiscono sul dark web
Luca Stivali - May 30th, 2025
Un attacco informatico ai danni di Deloitte è stato rivendicato dal threat actor “303”, che ha pubblicato su un noto forum underground un post con il titolo inequivocabile: “Deloitte.com Source Code +...

Digital Anonymity in Danger! What is the European Union deciding?
Alessio Stefan - May 15th, 2025
In recent years, political attention has expanded beyond the national borders of different states. Since the now outdated pandemic caused by COVID-19 and the (re)emergence of different conflicts in different...
Sign up for the newsletter