Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
2nd Edition GlitchZone RHC 970x120 2

Category: Cybercrime and Darknet

Famous hackers: Vladimir Levin and the first online bank robbery.

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking into the servers of the U.S. bank Citibank and transferring $400,000 from their accounts. When banks first went online, they were almost immediately targeted by hackers. Vladimir Levin was one of the first known hackers to attempt to rob a bank. Levin thus went down in history as one of the world’s most famous hackers, due to his early attempts to rob online banks. The beginnings and the first money transfers. Vladimir Leonidovich Levin was born on

Famous Hackers: Mafia Boy, the DDoS Wizard

Today we’ll learn about another great black hacker from the past. We’ll talk about Michael Calce, better known as Mafiaboy, one of the most famous and sought-after hackers in the world. He’s a Canadian hacker who carried out numerous hacking operations against major multinationals in the 2000s when he was 14 years old. Childhood Michael Calce was born in 1984 on the West Island of Montreal, Quebec. When he was five, his parents separated, and he lived with his mother after she won a long custody battle. Every other weekend, Michael stayed at his father’s apartment in Montreal, even though he felt

Lenovo launches the ThinkBook Plus G6 Rollable 2025 with a rollable display.

Tech giant Lenovo has officially started selling the ThinkBook Plus G6 Rollable 2025 , the world’s first laptop with a rollable display , previewed at CES 2025. The device’s main display measures 14 inches with a resolution of 2000 x 1600 pixels , but can extend vertically up to 16.7 inches in just 10 seconds , reaching a resolution of 2000 x 2350 pixels and increasing the viewing area by almost 50% . This 8:9 format allows for a wider working experience and is optimal for multitasking. AI Performance and Power The notebook integrates the Intel Core Ultra 7 258V processor, with

Cyber Attack on European Airports: Everest Ransomware Claims Claim

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of a third-party supplier, with cascading effects across the airport’s entire operational infrastructure. In the last few hours, a new section dedicated to Collins Aerospace (RTX) —one of the world’s leading suppliers in the aerospace and defense sector—has appeared on the official portal of the Everest Ransomware cyber gang, alongside a series of timers and announcements relating to the publication of confidential data. The screenshots show references to “ Databases over 50GB ”

Online PoC for 7-Zip flaws: Exploit allows arbitrary code execution

A proof-of-concept exploit has been developed for two critical vulnerabilities in the popular 7-Zip archiving software. These vulnerabilities could be exploited by attackers to remotely execute arbitrary code by sending malicious ZIP files. Their CVSS v3.0 score is 7.0 for both, a rating that underscores the significant impact they can have, beyond the first impression of a less serious threat. The flaws, identified as CVE-2025-11001 and CVE-2025-11002, were disclosed by the Zero Day Initiative (ZDI) on October 7, 2025 , and result from improper handling of symbolic links during ZIP extraction on Windows systems. These issues affect 7-Zip versions 21.02 through 24.09,

Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on prison sentences, fund transfers, and prison conditions undetected. This is the first documented case of inmates gaining access to the secure system used to administer all of the country’s penitentiary institutions. The incident began in July, when a convicted cybercriminal was temporarily admitted to the Dej prison hospital. There, he memorized the login and password of an employee with administrative rights. Upon returning to his facility, he used these credentials to

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult content. AB 105 / SB 130 , first introduced in March and already debated in the Assembly, is now before the Senate. Its goal is to require all websites distributing material “harmful to minors” not only to implement an age verification system but also to block access to users connected via VPN. This requirement effectively makes it illegal to use a VPN to circumvent state age restrictions. The authors argue that VPNs hinder effective surveillance by allowing adults and teenagers to hide

Introduction to Convolutional Neural Networks

In the ever-expanding world of artificial intelligence (AI), there is a revolutionary technology that has changed the way machines “see” and “understand” the world around them: Convolutional Neural Networks (CNNs). These powerful algorithms have opened new frontiers in computer science, making possible what was once considered science fiction. But what exactly are CNNs and how do they work? Get ready to discover all this in our journey through the history, fundamental concepts, and applications of this fascinating technology. The History of Convolutional Neural Networks Convolutional Neural Networks, like many of humanity’s greatest inventions, didn’t happen overnight. Their development began in the 1980s

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with a phenomenon that generates scams of all kinds. This column aims to raise awareness among everyone about the ever-increasing number of online scams, primarily originating from emails and social networks. This will be done through first-person stories told by the unfortunate victims, providing a final lesson learned. Author : Massimiliano Brolli Pasquale’s experience Hi guys, my name is Pasquale, I’m 55 years old and I’ve had an online bank account for a

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for home use to a technological cornerstone for the Internet of Things (IoT), smart cities, and enterprise infrastructure, Wi-Fi has evolved unstoppably. Today, in 2025, the arrival of Wi-Fi 7 (IEEE 802.11be) brings theoretical speeds of over 46 Gbps and latencies of less than a millisecond, but with it comes new challenges: security, interference, and spectrum management. In this article, part of Red Hot Cyber’s Wi-Fi series, we analyze the fundamentals of IEEE 802.11 networks, exploring their architecture, signal behavior, advantages, and limitations.