Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone Cyber News

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone

A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal...
Redazione RHC - June 22, 2025
ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay Cyber News

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay

During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been...
Redazione RHC - June 22, 2025
AKIRA emergency report: the ransomware that is breaching Italy Cybercrime

AKIRA emergency report: the ransomware that is breaching Italy

Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow...
RHC Dark Lab - June 22, 2025
Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia Cyber News

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia

[Singapore; 11 June, 2025] Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today...
Sandro Sana - June 11, 2025
RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series Cybercrime

RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series

On May 10, 2025, the City of Pisa suffered a ransomware attack within their computer systems. The next day Nova...
RHC Dark Lab - June 2, 2025
Bringing Your Imagination to Life: AI-Generated Images from Your Description innovation

Bringing Your Imagination to Life: AI-Generated Images from Your Description

Remember when you had a vivid image in your mind but struggled to describe it to someone else? Maybe it...
Ashleigh Crause - May 14, 2025
Why Europe’s healthcare sector must build resilience to fight the threat of ransomware Culture

Why Europe’s healthcare sector must build resilience to fight the threat of ransomware

Author: Andrea Nicelli, Head of Italy and Spain at Resilience Italy’s critical infrastructure is highly exposed to cyber threats, ranking...
Olivia Terragni - April 13, 2025
The Evil Purr – DarkLab Interview to HellCat Ransomware! Cybercrime

The Evil Purr – DarkLab Interview to HellCat Ransomware!

HellCat ransomware appeared in the second half of 2024 with and it has attracted the attentions of analysts thanks to...
RHC Dark Lab - March 30, 2025
VanHelsing RaaS: An Expanding Ransomware-as-a-Service Model Cybercrime

VanHelsing RaaS: An Expanding Ransomware-as-a-Service Model

The ransomware threat landscape is constantly evolving, with increasingly structured groups adopting sophisticated strategies to maximize profits. VanHelsing is a...
Pietro Melillo - March 22, 2025
NIST selects second PQC Key Encapsulation algorithm innovation

NIST selects second PQC Key Encapsulation algorithm

The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected...
Tara Lie - March 18, 2025
Paragon Spyware – Let’s talk about privacy and governments Cyberpolitics

Paragon Spyware – Let’s talk about privacy and governments

Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction...
Alessio Stefan - March 18, 2025
Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System Cyberpolitics

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System

The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025...
Olivia Terragni - March 18, 2025

22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking

Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator accounts and take complete control of the target site. The malicious activity was...

Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package”

The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team of lawyers, so that they could put pressure on the...

US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack

The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and...

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems

According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass...

$200 for Access to an Italian Company! While the Dark Web is doing business, are you ready to defend yourself?

Following the case of the 568 endpoints of an Italian industrial machinery company, another compromised access related to an Italian software engineering company has ended up for sale on an underground forum...

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. "The goal of this initiative is to provide the best set of...
Cyberspazio: il filo invisibile tra guerra e pace

Cyberspace: The Invisible Thread Between War and Peace

How Iran-Israel’s Digital War Redefines Security, Diplomacy, and the Global Future? Since June 12, a 700% increase in cyber activity has been detected, resulting in a wave of DDoS attacks,...

Cloudflare Mitigates 7.3 Terabits Per Second Attack. Imagine 9350 HD Movies Downloaded in 45 Seconds

In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: 7.3 terabits per second (Tbps). This event comes shortly after the release of the DDoS Threat Report for Q1...

Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks

Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effective tools for encrypting traffic and preventing data...
sicari a pagamento

Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe

A worrying criminal trend is taking hold in Europe: criminal gangs are using encrypted apps to recruit teenagers as young as 14 to commit violent crimes, including contract killings. These...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE