Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

- March 18th, 2025 - (Posted in Cyber politics)
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the U.S. government in preventing access to “strong enough” cryptography for foreign nationals and states were numerous from 1990 onward. Dubbed...

Alleged Cyber Attack on Dana Pensiun Bank Mandiri

- March 1st, 2025

Alleged Cyber Attack on Dapenbankmandiri.co.id A well-known threat actor, using the alias "LordVoldemort," has claimed on an underground forum to be in possession of an alleged data set belonging to...

  

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future

- February 24th, 2025

Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based...

  

Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data

- February 20th, 2025

In the DarkLab group's underground analysis activity, we ventured onto an onion site that is apparently a Data Leak Site (DLS) of a new ransomware cyber gang. This new actor...

  

UK digital Crackdown

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights


- February 12th, 2025

In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...

  

Sign up for the newsletter