Red Hot Cyber. The Cybersecurity Blog

The History of the UNIX operating system (Part 1)
Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used across the world, and is so versatile that it can be used on any type

Hacker gang OPERA1ER stole $11 million from African companies
Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researchers from Orange CERT Coordination Center. The report takes a deep dive into financially motivated attacks of the prolific French-speaking threat actor, codenamed OPERA1ER. Despite relying solely

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”
Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an Italian electronics pioneer. In the 60’s he worked for Olivetti, and led the team that built the Olivetti Programma 101

RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”
Translator: Tara Lie We often talk about the LockBit Ransomware-as-a-Service (RaaS) operation, recently remodelled as LockBit 3.0, which continues to bring important innovations to the ransomware cyber circus. Often these new alterations are so disruptive that they are adopted by other

The Superuser Story – The History of #root
Author: Massimiliano BrolliTranslator: Tara Lie In the beginning there was the Word… Computers, before passing into the era of transistors, were cyclopean machines – heavy and hungry for electricity. They used thermionic valves or vacuum tubes to work, and then were only

Spacewar! The Story of the First Video Game Created by Hackers at MIT
Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie In this exciting story, we will catapult ourselves back to 1958 to MIT’s Tech Model Railroad Club and meet Steve Russel, Steve was one of the first hackers and wrote one of the first

The Hackers Choice – 30 years of hacking without trying to get rich!
Alessio Stefan - July 16th, 2024
Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...

Rockstar Games Possibly Victim of a Massive Data Leak!
Pietro Melillo - July 16th, 2024
Recently, an alleged data leak has involved Rockstar Games, one of the world's largest video game producers, famous for titles like Grand Theft Auto and Red Dead Redemption. According to...

Potential Data Leak from Google: 1 Million Records Exposed
Pietro Melillo - July 15th, 2024
Recently, a threat actor claimed to have publicly released one million records scraped from Google, raising significant alarm regarding personal data security. The information appeared on an online forum in...

Threat Actor 888 Claims Compromise of BMW (Hong Kong) Customers
Pietro Melillo - July 15th, 2024
Recently, a concerning news story has emerged in the world of cybersecurity. A well-known hacker, identified by the nickname 888, has allegedly leaked sensitive data belonging to BMW customers in...
Sign up for the newsletter