Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Enterprise BusinessLog 970x120 1

Category: Culture

The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor

Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expert, public speaker, and writer. He is a globally recognized icon of hacking (both black and white), as well as the author of two exceptional books: “The Art of Deception” (2003) and “The Art of Intrusion” (2005). He was arrested for hacking into the computer network of Digital Equipment Corporation (DEC) and while on parole, he hacked into Pacific Bell’s voicemail system. A new arrest warrant was issued against him and he spent the next 3 years as

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We’re not just talking about scams or identity theft, but a whole range of illicit activities that can be exploited in a wide variety of ways. This applies to both data exposed online and data found on dark web marketplaces, with the common goal of making direct or indirect profits. Having learned that the undesirable use of our personal data exists and is indeed a significant market for cybercriminals, we might now conclude that all privacy regulations are completely

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In response to this need, penetration testing methods have evolved to go beyond the traditional technology-based approach, introducing Adversary Emulation. This new methodology focuses on the human aspect of vulnerabilities and the importance of a holistic approach to corporate security. What is Adversary Emulation? Adversary Emulation is an advanced penetration testing methodology that simulates attacks from a real adversary. Unlike traditional penetration testing, which focuses primarily on technical vulnerabilities, Adversary Emulation takes into

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of insurance that protects your business from financial losses caused by cyber attacks, data breaches, and other technology-related incidents. In this article, we’ll explore cyber insurance in detail and help you understand how it can help protect your online business. What are cyber insurance policies? Cyber insurance is a form of insurance that provides coverage for financial losses that may arise from cyber attacks, data breaches, and other technology-related incidents. This type of

Let’s find out what Business Impact Analysis (BIA) is

Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their operations, the risks associated with those activities, and the impacts of their unavailability. The ultimate goal of the BIA is to develop business continuity strategies and measures to minimize the negative impacts of any business interruptions. In this article, we’ll explore what Business Impact Analysis is and how it can be used to ensure business continuity within a large organization. Definition of BIA Business Impact Analysis (BIA) is an analytical process that identifies critical business activities, the risks associated with those activities,

What is risk analysis in ICT Risk Management?

Risk analysis is an important process in the context of ICT Risk Management as it allows us to evaluate the effectiveness of the technical countermeasures adopted to mitigate ICT risks. This process involves assessing the security of information systems and technological infrastructure, as well as the information security management processes adopted by the organization. In this article, we’ll explore what risk analysis means and how this process helps organizations reduce cyber risk and increase resilience. Asset Identification In IT risk management, asset identification is a key step in the risk assessment process. In this step, the company’s IT assets are identified and

What is Web Scraping? Let’s Understand It Better

We have often talked about huge user databases being sold on underground forums and said that this was web scraping. In April 2021, Facebook lost 533 million users , while in June 2021, LinkedIn lost 700 million users , practically its entire user base which in fact currently amounts to 756 million users. LinkedIn immediately clarified: “Our teams have been investigating a series of alleged LinkedIn data leaks that were made available for sale. We want to be clear that this is not a data breach and that no private LinkedIn member data was exposed.” But then, if everything is in order

Exploring Cyberspace: States and Wars Without Geographic Borders

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between the beauty of always being connected and the threats that constantly impact it, I’d like to tell you a story, one that is as simple as possible but useful in helping you understand the importance that cybersecurity has in all of our lives today. Are you ready? Let’s go. In June 2009, the US and Israeli governments, as part of the “2006 Olympic Games” operation promoted by Bush, created a computer virus

The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah

A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled ” UNIX Original From Bell Labs V4 (See Manual for format) ” was discovered at the University of Utah: likely an original copy of UNIX Fourth Edition, created at Bell Labs around 1973. Professor Robert Ricci of the Kahlert School of Computing announced it in a post on Mastodon . He said the tape was found by employees cleaning out a warehouse. The professor recognized the handwriting on the label as that of his supervisor, Jay Lepreau

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25, the International Day for the Elimination of Violence against Women. The focus here is on the non-consensual dissemination of intimate images and its legal and social implications. The non-consensual sharing of intimate images, known as revenge porn , is one of the most insidious and pervasive manifestations of Online Gender-Based Violence (OGV). In legal and criminological debate, the more neutral term Non-Consensual Sharing of Intimate Images (NCII) is preferred to fully recognize it as an act of oppression and a predominantly