Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Crowdstriker 970×120

Category: Hacking revolution

Hackers: Who They Are, What They Do, and Their Role in Today’s World

The meaning of ” hacker ” has deep roots. It derives from the English “to hack,” meaning to chip away, cut, strike, or cut. It’s a powerful image, that of a farmer breaking up clods of earth with his rough hoe, revealing what lies beneath the surface. Likewise, a hacker can explore the darkest recesses, challenging their limits and bringing to light powerful innovations unlike anything anyone has ever seen before. But who are hackers really? In this article, we’ll explore the hacker from every angle. We’ll look at who they are, their motivations, and their role in today’s digital world. We’ll

The First Hackers in History: Hacking Is a Journey, Not a Destination

The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the history of hacking, where it all began, precisely on the ground floor of Building 26 at MIT (Massachusetts Institute of Technology), precisely in 1958 at the Tech Model Railroad Club, by model railway enthusiasts. The club, which ran a very sophisticated model railway, was drastically divided into two factions: The system was constantly improved, renewed, perfected, especially when it became “gronked,” in club slang meaning “ruined.” The freshmen collaborated with the senior members, but all

Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs

Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the topic of a user’s conversation, even when using HTTPS. The company explained that the data leak affected conversations with streaming LLMs, models that send multi-part responses as they’re generated. This mode is convenient for users because they don’t have to wait for the model to fully compute a long response. However, it is precisely through this method that the context of the conversation can be reconstructed. Microsoft emphasizes that this represents a privacy

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of Large Language Models (LLMs), integrated directly into the technical workflow. One of the most interesting examples is LLM-Tools-Nmap , presented by Hackers Arise , which allows you to drive Nmap via natural language instructions . In practice, the template translates the request (“scan the most common web ports on this /24 at a moderate speed and output to XML”) into a correct and safe Nmap command, including timing options, NSE scripts, and

13,000 times faster than a supercomputer. Google presents Willow, the fastest quantum chip on specific algorithms

Google’s quantum AI team announced a major breakthrough in quantum computing with the unveiling of its new Willow processor, a superconducting chip with 105 qubits that it says can perform some calculations 13,000 times faster than today’s most powerful supercomputers. Willow has successfully completed the Quantum Echoes algorithm , a test designed to measure quantum chaos. Unlike the 2019 Sycamore experiment, which demonstrated quantum “supremacy” only in a highly specific, randomized test, Willow ’s results have broader scientific value, enabling the modeling of molecular structures and electronic behavior with much greater precision. Michel Devore, one of the physicists leading the project, described

Famous Hackers: The Story of Andrian Lamo

Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into prestigious companies while wandering around with his backpack to being called a “spy” by the hacker community, Adrian has been a controversial but highly interesting figure in the hacking world. Childhood and the attraction to hacking Adrián Alfonso Lamo Atwood was born in Malden, Massachusetts, USA, on February 20, 1981. He attended high school in San Francisco, but dropped out after many arguments with his teachers. He didn’t graduate but studied journalism at American River

Famous Hackers: Mafia Boy, the DDoS Wizard

Today we’ll learn about another great black hacker from the past. We’ll talk about Michael Calce, better known as Mafiaboy, one of the most famous and sought-after hackers in the world. He’s a Canadian hacker who carried out numerous hacking operations against major multinationals in the 2000s when he was 14 years old. Childhood Michael Calce was born in 1984 on the West Island of Montreal, Quebec. When he was five, his parents separated, and he lived with his mother after she won a long custody battle. Every other weekend, Michael stayed at his father’s apartment in Montreal, even though he felt

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melodies could still come to life through the glow of lamps and punched tape. The older PDP-1 computer, famous for being the birthplace of one of the first video games, suddenly spoke with the voices of the Boards of Canada, playing their composition ” Olson ” using paper tape and flashing lights. The project was implemented by Peter Samson, a hacker culture pioneer at the TMRC and an engineer and volunteer at the Computer History Museum

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN’s Linux clients that compromise basic anonymity and traffic security. The issues affect both the graphical (2.10.0) and console (2.0.1) versions. Both were tested on Ubuntu 24.04.3 LTS. The main vulnerability arises because when reconnecting to Wi-Fi or waking the system from sleep mode, the user’s true IPv6 address becomes visible. In the console client with the Internet Kill Switch feature enabled, the service automatically reports the connection resumption, but during this time the system receives IPv6 routes via Router Advertisement, causing packets to bypass

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with design assistance from Susan Kare, and has become one of the most widely used software programs in Windows history. Since its introduction, Solitaire has become incredibly popular in offices and schools, so much so that Microsoft has received complaints about lost productivity due to time spent playing it . A well-known story tells of an employee in New York City being fired after Mayor Bloomberg saw the game on his screen. In