
Signal towards the Future: Post Quantum Cryptography now protects our messages
Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making

Hacker gang OPERA1ER stole $11 million from African companies
Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researchers from Orange CERT Coordination Center. The report takes a deep dive

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”
Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an Italian electronics pioneer. In the

RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”
Translator: Tara Lie We often talk about the LockBit Ransomware-as-a-Service (RaaS) operation, recently remodelled as LockBit 3.0, which continues to bring important innovations to the ransomware

The Superuser Story – The History of #root
Author: Massimiliano BrolliTranslator: Tara Lie In the beginning there was the Word… Computers, before passing into the era of transistors, were cyclopean machines – heavy and hungry

Spacewar! The Story of the First Video Game Created by Hackers at MIT
Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie In this exciting story, we will catapult ourselves back to 1958 to MIT’s Tech Model Railroad Club and meet

LockBit 3.0: making the ransomware Great Again
LockBit is a major player in the ransomware scene and has contributed heavily for this cyber-crime model to become one of the most popular and

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company
A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility
Summary: 1. The cyber aggression on Albania.- 2. A legal analysis of cyber aggression.- 3. The problem of cyber malicious activities attribution.- 4. The role