Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Fortinet 970x120px

Category: Cyberpolitics

Latvian Government Database Compromised: Over 1.6 Million Government Data Lines!

A malicious actor has claimed to have leaked a database containing over 1.6 million lines of data from the Latvian government. The data breach, dated July 7, 2024, includes all information from Latvian government authorities. Incident Details The announcement of the breach was made on a specialized forum, where the user identified as Hana posted the initial message. Hana, a VIP user with 15 posts and a reputation of 30, indicated that the data dump includes 1,660,183 lines. The post provides a description of the extent of the leak, emphasizing that all data from the Latvian government has been compromised. Authenticity of

Julian Assange Free! Freedom Reclaimed After Five Years of Detention

London, June 25, 2024 – Julian Assange, the founder of WikiLeaks, was released yesterday from the maximum-security Belmarsh prison after spending 1901 days in detention. The news was announced by WikiLeaks on the social media platform X, confirming that Assange has accepted a deal with the U.S. justice system to plead guilty to a minor offense related to the publication of top-secret documents, thus avoiding extradition and allowing him to return to Australia. Assange’s release was made possible by a decision from the High Court in London, which granted him bail. Yesterday afternoon, Assange was released at Stansted Airport, from where he

Why privacy does not exist

Privacy, privacy, privacy, … privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work, we talk about it at school, we talk about it at the bar because it is a concept that in a democratic world should be a right, but in fact, in the era of digital, social, mobile phones as a “prosthesis” of our body, it could be a utopia today. But I don’t want to jump to any would not like to draw conclusions, today I would like to talk about this

Electronic warfare between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of the next president of South Korea. To begin the command of the Armed Forces of the Republic of Korea (CFC) and the United States will have to devise a strategy to deter cyber attacks. The first part of this article can be found here: North Korea’s cyber warfare and its cyber army (part one) What are the targets? North Korea is capable of deploying advanced technologies, and the main objectives are critical

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so little to comprehend what’s happening there. Maybe it is hard for many to believe that a hacking army – capable of compromising computer networks around the world – is hiding in Pyongyang, when only a small fraction (1%) of North Koreans have access to the Internet. Yet here, hackers are identified and trained as the former Soviet Block – NewYorker underlined – did with olympionics. Except that the key resource this time

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems, such as RDP. The initial intrusions usually take place via existing vulnerabilities or stolen legitimate credentials. C25 Intelligence finally reports from where Dharma variants have been operated during 2020 and how to defend against this threat. What is dharma/crysis ransomware Dharma, a family of ransomware first spotted in 2016, is a malicious program that encrypts a victim’s files and takes as hostage the data on demand for the ransom payment to restore