Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...

Cyber politics

Why privacy does not exist.

Author Massimiliano Brolli Translation: Vincenzo Marcovecchio Pubblication date: 18/12/2021 Privacy, privacy, privacy, … privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work, we

Cyber politics

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so little to comprehend what’s happening there. Maybe

Hacking revolution

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This is incredibly challenging. Of course, it’s not that easy in

Technology Evolution

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction – Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution. Inventors and

Cyber politics

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems, such as RDP. The initial intrusions usually take place via

Medusa Ransomware claims responsibility for the attack on Harry Perkins Institute

- July 5th, 2024

On July 3, 2024, the Australian research institute Harry Perkins was the victim of a ransomware attack claimed by MEDUSA on their official DLS. More than 4.6 Terabytes of CCTV...

  

A new potential data breach has exposed sensitive information of 70,000 users of the French amusement park Bol D’Air on BreachForum

- July 4th, 2024

Fresh Data Breach Exposes Sensitive Information of French Amusement Park Bol D'Air on BreachForum. Currently, we are unable to accurately confirm the veracity of the breach, as no press release...

  

Potential Data Breach: Sensitive Indonesian Data for Sale on Dark Web

- July 4th, 2024

A recent alert in information security landscape has been issued: a threat actor has announced the sale of the Attorney General's Office of the Republic of Indonesia (Kejaksaan Agung Republik Indonesia)...

  

Threat Actors Post Tennis Tournament Data Breach in Israel

- July 4th, 2024

Recently, a threat actor in an underground forum published an alleged data breach. This breach is claimed to have compromised the personal information of thousands of participants and instructors involved...

  

Sign up for the newsletter