Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

- January 13th, 2025 - (Posted in Cybercrime and Darknet)
In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a similar technique on Twitter, but this is the first time that was used in Ransomware Attacks. So, it’s time to...

Alleged SpaceX Database Breach Published on BreachForums

- September 21st, 2024

A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed...

  

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!

- September 21st, 2024

Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named "l33tfg," asserts that...

  

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”

- September 19th, 2024

Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage or illustrious ruler....

  

Navigating the future: a dialogue on human resilience and preservation

- September 5th, 2024

Participants: NewPlato: A contemporary philosopher seeking to understand the nature of human civilization and its future. NewSocrates: A wise mentor exploring the implications of population growth, technological advancements, and the...

  

Sign up for the newsletter