Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Redhotcyber Banner Sito 970x120px Uscita 101125

Day: July 26, 2022

lockbit

RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”

Translator: Tara Lie We often talk about the LockBit Ransomware-as-a-Service (RaaS) operation, recently remodelled as LockBit 3.0, which continues to bring important innovations to the ransomware cyber circus. Often these new alterations are so disruptive that they are adopted by other cybergangs due to how effective they are, introducing novelties or alternate ways to obtain a ransom payment. As we know, cyber gangs have recently moved to version 3.0, which we have previously analysed to compare it to previous versions. The cyber gangs, like any regular organisation, updates and evolves its “business model” by continuously innovating –  finding new ways to evade the

The Superuser Story – The History of #root

Author: Massimiliano BrolliTranslator: Tara Lie In the beginning there was the Word… Computers, before passing into the era of transistors, were cyclopean machines – heavy and hungry for electricity. They used thermionic valves or vacuum tubes to work, and then were only able to perform very small computations. Let’s discuss for example the ENIAC, 1945, the first digital general-purpose computer, created to solve problems regarding the calculation of the ballistic curves of bullets. The Electronic Numerical Integrator and Computer (ENIAC) This gigantic computer took up 1800 square feet of space, and would consume about 150 kilowatts of power. It is said that the very