Red Hot Cyber. The Cybersecurity Blog

LockBit 3.0: making the ransomware Great Again
LockBit is a major player in the ransomware scene and has contributed heavily for this cyber-crime model to become one of the most popular and imitated in the threats landscape. The version 2.0 of its project entered the scene in

The Founding Fathers of the Hacker Community
Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie Hacker culture was brought to life thanks to computer scientist Richard Greenblatt and mathematician Bill Gosper at the Massachusetts Institute of Technology (MIT). It all started at MIT’s famous Tech Model Railroad Club (TMRC),

Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations
Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials save lives, prevent further crimes from being committed by perpetrators, and also provide a detailed information platform that can stitch together obscure tidbits

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future
Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos” is the name retrospectively used by journalist Steven Levy, in his 1994 book ‘Insanely Great’, to describe a revolutionary demonstration held on a rainy Monday, 9th December 1968, at

Vannevar Bush’s Visionary Essay: “As We May Think”.
Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a source of inspiration for many scientists that have contributed to technological innovation, especially in computer science in the years following

Critical Apache Tomcat Vulnerability CVE-2024-34750 Could Bring Your Server to a Halt!
Raffaela Crisci - July 5th, 2024
The vulnerability CVE-2024-34750 in Apache Tomcat, as described in the security bulletin AL01/240705/CSIRT-ITA, concerns an issue that can be exploited to overload the server's computing resources, leading to a Denial...

Threat Actors: Alleged Data Breach of Ukraine Traffic Police
RHC Dark Lab - July 5th, 2024
Recently, a threat actor in an underground forum published an alleged data breach. The leak purportedly involves sensitive information from the Ukraine traffic police (GAI). The data, spanning millions of...

Serious Vulnerability in Windows Systems: Here’s How an Attacker Can Gain Complete Control of Your PC
Alessio Stefan - July 5th, 2024
A severe security vulnerability has been discovered in MSI Center, a widely used software on Windows systems. This flaw, classified as CVE-2024-37726 and with a CVSS score of 7.8 (high), allows a low-privileged attacker...

Medusa Ransomware claims responsibility for the attack on Harry Perkins Institute
Alessio Stefan - July 5th, 2024
On July 3, 2024, the Australian research institute Harry Perkins was the victim of a ransomware attack claimed by MEDUSA on their official DLS. More than 4.6 Terabytes of CCTV...
Sign up for the newsletter