Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

- July 12th, 2025 - (Posted in Cybercrime and Darknet)
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern societies on technology and information. In this article, we will explore the nature of cyber warfare,...

The History of the UNIX operating system (Part 1)

Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used across the world, and is so versatile that it can be used on any type

Hacker gang OPERA1ER stole $11 million from African companies

Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researchers from Orange CERT Coordination Center. The report takes a deep dive into financially motivated attacks of the prolific French-speaking threat actor, codenamed OPERA1ER. Despite relying solely

The Superuser Story – The History of #root

Author: Massimiliano BrolliTranslator: Tara Lie In the beginning there was the Word… Computers, before passing into the era of transistors, were cyclopean machines – heavy and hungry for electricity. They used thermionic valves or vacuum tubes to work, and then were only

Spacewar! The Story of the First Video Game Created by Hackers at MIT

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie In this exciting story, we will catapult ourselves back to 1958 to MIT’s Tech Model Railroad Club and meet Steve Russel, Steve was one of the first hackers and wrote one of the first

The Hackers Choice – 30 years of hacking without trying to get rich!

- July 16th, 2024

Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...

  

Rockstar Games Possibly Victim of a Massive Data Leak!

- July 16th, 2024

Recently, an alleged data leak has involved Rockstar Games, one of the world's largest video game producers, famous for titles like Grand Theft Auto and Red Dead Redemption. According to...

  

Potential Data Leak from Google: 1 Million Records Exposed

- July 15th, 2024

Recently, a threat actor claimed to have publicly released one million records scraped from Google, raising significant alarm regarding personal data security. The information appeared on an online forum in...

  

Threat Actor 888 Claims Compromise of BMW (Hong Kong) Customers

- July 15th, 2024

Recently, a concerning news story has emerged in the world of cybersecurity. A well-known hacker, identified by the nickname 888, has allegedly leaked sensitive data belonging to BMW customers in...

  

Sign up for the newsletter