Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
970x20 Itcentric

Author: Redazione RHC

Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented the World Wide Web? Today we talk about Timothy Berners-Lee, the British computer scientist, who received the prestigious Turing Award in 2016 for the invention of the World Wide Web together with Robert Caigliu. The big idea But let’s proceed in order. In 1989, at CERN in Geneva, the most important European physics laboratory, Berners-Lee was struck by how some Italian colleagues were using a telephone line to transmit information from one floor of the

Marketing is nothing! VPNs sell themselves every time a government blocks adult sites

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory identity verification on adult websites , and similar laws are being introduced in some US states and Italy . In response to all of this, VPNs, services that allow users to hide their real location and bypass restrictions, have seen exponential growth. VPN service sales are skyrocketing As the BBC points out, since the Online Safety Act came into force in the UK, Proton VPN registrations have increased by over 1,400%, while NordVPN has seen a 1,000% increase in subscriptions. According

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans

It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for building a new headquarters on its Redmond campus. The goal was to ensure such an incident never happens again during public presentations. This memorable moment occurred at the massive COMDEX trade show, several months before the official release of Windows 98. Bill Gates was giving the keynote presentation, and Microsoft employee Chris Capossela was demonstrating a new feature: plug-and-play support for USB devices. While connecting a scanner, which was supposed to automatically download drivers, the

Roblox: The Platform That Puts Children’s Safety at Risk

With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Australia, young players spend an average of 137 minutes a day in the virtual world. However, behind the vibrant image of square avatars and millions of user-generated games lies a disturbing reality, as revealed by a Guardian journalist who decided to immerse herself in this world for a week, posing as an eight-year-old girl. The experiment began with registration, which turned out to be extremely simple: all it took was a username, date of birth, and a

The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah

A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled ” UNIX Original From Bell Labs V4 (See Manual for format) ” was discovered at the University of Utah: likely an original copy of UNIX Fourth Edition, created at Bell Labs around 1973. Professor Robert Ricci of the Kahlert School of Computing announced it in a post on Mastodon . He said the tape was found by employees cleaning out a warehouse. The professor recognized the handwriting on the label as that of his supervisor, Jay Lepreau

21 Years of Firefox: A History of Innovation and Independence

November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla’s new browser, which quickly positioned itself as a simple and secure alternative to Internet Explorer . Initially, it boasted tabbed browsing, pop-up blocking, a flexible extension system, and intuitive privacy settings, quickly attracting both the public and the press. Before its release, the browser underwent several name changes. The experimental branch of the Mozilla Suite was initially called Phoenix , then Firebird , and, in February 2004, Firefox . It was chosen for its uniqueness and lack of conflict, and the red fox

Hyundai subsidiary HAEA data breach: Sensitive information at risk

HAEA, a subsidiary of South Korean Hyundai Motor Group and headquartered in California, USA, provides customized IT solutions and services for the automotive industry, particularly to Hyundai and Kia subsidiaries. These solutions include vehicle telematics, over-the-air (OTA) updates, mapping, vehicle connectivity, embedded systems, and autonomous driving systems. The company also provides enterprise systems for automotive plants, including sales and ERP systems, as well as digital manufacturing platforms. HAEA reported that attackers successfully breached its network on February 22 and maintained unauthorized access to the system for 10 days before being discovered on March 2. An internal investigation revealed that hackers accessed parts

Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.

Researchers discovered several libraries in the public NuGet registry containing code that will be activated in 2027 and 2028. The infected packages target three popular .NET data storage engines (Microsoft SQL Server, PostgreSQL, and SQLite) , and one component is specifically disguised as a library to work with Siemens S7 controllers. Socket analysts found nine packages posted by the shanhai666 account. At first glance, the libraries appeared to function normally: almost all of the code ( about 99% ) performed useful functions, so the developers might not have noticed anything suspicious. However, each library contained a small piece of malicious logic ,

Vault7 with a Chinese twist: China’s secret global surveillance system exposed

Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA’s arsenal: toolkits for penetrating smartphones, smart TVs, and operating systems, command and control infrastructure, and frameworks for obfuscating code. Tools like Weeping Angel (which turned TVs into microphones), HIVE (C2 for hundreds of implants), and the Marble Framework (for masking and falsely attributing malware) demonstrated that offensive intelligence was common practice even for Western powers. Today, with the Knownsec leak, the same scenario is being repeated under a different banner: rather than judging who is “worse,” it’s confirmation that

Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs

Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the topic of a user’s conversation, even when using HTTPS. The company explained that the data leak affected conversations with streaming LLMs, models that send multi-part responses as they’re generated. This mode is convenient for users because they don’t have to wait for the model to fully compute a long response. However, it is precisely through this method that the context of the conversation can be reconstructed. Microsoft emphasizes that this represents a privacy