Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Enterprise BusinessLog 970x120 1

Category: Hacking revolution

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common in the war sector, with Europe attempting to shift some of its member states’ resources, and the United States increasingly adopting a highly protectionist economic stance, using tariffs as a means of reducing trade deficits with key countries, including China. INTRO – The Silence of the Dragons The recent decisions taken by POTUS Donald Trump regarding the Chinese economic entity are nothing more than the continuation of decisions taken in the first

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

In red teaming, the term “tailgating” refers to a technique in which a team member attempts to gain unauthorized access to a protected area or computer system, such as by closely following an authorized employee or legitimate user. This control technique, used in the context of red teaming, focuses on assessing the security of business processes, systems, and access controls. However, while traditional penetration testing has long been a key component of cybersecurity operations, the threat landscape is constantly evolving. This has led to the need to consider a wide range of attack vectors, including tailgating. What is Tailgating Tailgating is a

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of “collaboration”. It is the fruit of the genius of Torvalds but also of many hackers/programmers scattered around the globe, who contributed, each in their own way, to the creation of a “disruptive” innovation for that period historical, where software was completely veering towards “closed source” logic. It all started with Linus Benedict Torvalds, born in Helsinki, Finland, on December 28, 1969 to Nils and Anna Torvalds. But Torvalds aside, the history of the Linux kernel introduces

Cult of the Dead Cow (cDc). The story of the most famous hacker group.

Hacker culture, as we’ve already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked about its origins in a video dedicated to the Tech Model Railroad Club, the famous club where the first hacker community took shape at the Massachusetts Institute of Technology. But much later, in the era of BBS and IRC, in that period between the 1980s and 1990s, a series of hacker groups formed around the world, which influenced and shaped hacker culture and security. IT of that historic period. In these groups, the most recognized ones, they didn’t just

Discovering the Jargon File! The Living Relic of Hacker Culture

Jargon File version 4.4.7 Today I would like to talk to you about a very old computer document, containing a piece of everyone’s hacker and computer culture times, of which many computer scientists do not even know its existence. It is a collection of technical culture terms, some of these dating back to the 50s, some coined at the Tech Model Railroad Club of MIT, and then updated over the years and arrived to us today. Winlosehackcrashdeamondeadlock These are just some of the terms present in the jargon file, terms that have become common jargon that we all know. The Jargon file

The History of Email. How This Invention Impacted the Modern Era

Email was in fact the first of those disruptive revolutions that catapulted the world into the era of networks and the Internet. Thinking about offices today, before the email revolution makes many people smile, but in fact before this innovation, email messages had to be physically carried from one place to another through couriers and postmen. But in late 1971, a computer engineer named Ray Tomlinson, who worked at Bolt Beranek and Newman (BBN), a contractor for the United States Department of Defense in 1968 that played a key role in the creation of the ARPANET network, precursor to the Internet, sent

The “Declaration of Independence of Cyberspace”

“Governments of the World, weary giants of flesh and steel, I come from Cyberspace, the new home of the Mind. On behalf of the future, I ask you, beings of the past, to leave us alone. You are not welcome among us. You have no sovereignty over the places where we meet.” Thus on February 8, 1996 began the document “A Declaration of the Independence of Cyberspace“, on the applicability (or lack thereof) of Internet governance, in that rapidly growing historical period. It has been more than 10 years since the publication of the famous essay “The Hacker Manifesto” or “The Conscience

Satoshi Nakamoto: Discover the Mysterious Inventor of Bitcoin.

The true identity of the creator of Bitcoin is one of the biggest mysteries in the tech world. Over the years, many theories have emerged about who Satoshi Nakamoto really is, ranging from a time traveler, an alien, an artificial intelligence or a cover for US intelligence, such as the NSA and the CIA. Satoshi Nakamoto The name Satoshi Nakamoto is a pseudonym, an alias used by a person, or a group of people, who created Bitcoin while hiding their true identities. Satoshi is a Japanese name meaning “a man with wise ancestors” and is assumed to be male. On October 31,

The symbol of the hacker community: today we talk about the Glider.

The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic humor, of memes, but above all culture, engineering and science. But while Linux has its penguin, BSD has its daemon and Perl His camel, what has always been historically missing in the hacker community was a symbol that represents its history and culture. Today we’re going to talk about the hacker symbol: the glider. The hacker symbol: the Glider. Free software guru Richard Stallman said that hackers had in common a love of excellence and programming.  They wanted their

The Story of Open Source: A Success Story of Humankind

Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world without it. Talking about Linux, Android, Apache, are just some of the names we use in everyday life, which have become common jargon, but behind their communities of developers who created them, there is an intense and convulsive history that is interesting to know, especially if you work in the IT sector where the concept of open source has revolutionized the market of software. The philosophy of free software The history of