Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

- June 12th, 2025 - (Posted in Cybercrime and Darknet)
Ghost Security, also known as GhostSec, is a hacktivist group which emerged in the context of the cyber war against Islamic extremism. The first actions of the group date back to the aftermath of the attack on the Charlie Hebdo newsroom, January 2015. It is considered an offshoot of the...
Hacking revolution

The Superuser Story – The History of #root

Author: Massimiliano BrolliTranslator: Tara Lie In the beginning there was the Word… Computers, before passing into the era of transistors, were cyclopean machines – heavy and hungry

Intel CPUs Vulnerable! New “Indirector” Attack Threatens Sensitive Data Detection.

- July 3rd, 2024

Modern Intel processors, including Raptor Lake and Alder Lake CPUs (i.e., 12th and 13th generation Intel "Core" processors), are vulnerable to a new high-precision Branch Target Injection (BTI) attack called...

  

Threat Actors Release 2022 Electronic Arts (EA) Employee Database

- July 2nd, 2024

Recently, a threat actor allegedly leaked a database containing information on Electronic Arts (EA) employees from 2022. The data breach was confirmed by the threat actor himself, who explained the...

  

OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk

- July 2nd, 2024

A recent critical vulnerability in OpenSSH, identified as CVE-2024-6387, could allow unauthenticated remote code execution with root privileges on glibc-based Linux systems. This flaw resides in the server component of...

  

Possible Data Breach of the Internal Security Operations Command (ISOC)

- July 1st, 2024

A member of BreachForums has announced a significant data breach involving Thailand's Internal Security Operations Command (ISOC), an agency known as the political arm of the Royal Thai Armed Forces....

  

Sign up for the newsletter