fbpx

Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

- January 13th, 2025 - (Posted in Cybercrime and Darknet)
In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a similar technique on Twitter, but this is the first time that was used in Ransomware Attacks. So, it’s time to...

RHC DarkLab Interview Stormous Ransomware. Between history, ideology, techniques and tactics

- November 24th, 2024

The Stormous group represents a significant threat in the ransomware landscape: it has an established reputation for its targeted attacks and its overtly pro-Russian ideology. The group may have started...

  

How Threat Actor make EDR’s harmless with a reboot

- November 22nd, 2024

I became aware of this technique like 9 months ago, and now I see this on a attack in the wild conducted by Qilin Ransomware Gang, so it’s time to...

  

The Story Of Conti Ransomware – The War Within (Episode 2)

- November 22nd, 2024

This is a continuation of the Conti story. You can read the previous part, which covered the group's origins, in the previous article. We will now explore the internal components...

  

IntelBroker Claims Tesla Charging Database Breach

- November 20th, 2024

Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims that Tesla’s charging station database has been compromised and made...

  

Sign up for the newsletter