Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Enterprise BusinessLog 970x120 1

Category: Hacking revolution

Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF

The first edition of the International Cybersecurity Olympiad ended in Singapore with an excellent result for Italy. Four Italian students reached the podium, winning gold and silver medals in the competition that brought together about 150 talents from 30 countries around the world. The Italian team, led by Gaspare Ferraro and Matteo Rossi, won a gold medal Leonardo Mattei from the “Antonio Labriola” Scientific High School in Rome and Jacopo Di Pumpo from the “Marie Curie” I.T.S.O.S in Cernusco sul Naviglio. In addition,Alan Davide Bovo from the “Pascal Comandini” High School in Cesena and Stefano Perrucci from the “Enrico Fermi” Technical Institute

Herm1t Interview – From VX Heaven to the war gates!

This is the story of Herm1t, founder of VX-Heaven, hacker – currently active in protecting Ukraine from 2014 –  and founder of RUH8 in fall 2015, told by means of an interview that sought to focus on its history, values and goals, while also trying to understand what are the most important elements that distinguish the ongoing cyber war between Russia and Ukraine. In our interview with Smelly, founder of VX-Underground, we explored a world committed to openly sharing as much malware-related data as possible. By amassing samples, papers, and articles into a centralised library, VX-Underground builds upon the legacy of VX-Heaven,

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management IntroductionThe recent acquisition of BreachForums by IntelBroker marks a significant shift in the landscape of cybercrime. This transition of power occurs at a crucial time for the forum, which has recently experienced a period of stagnation and inefficiency under the previous administration. The arrival of IntelBroker as the new owner promises to renew and strengthen the platform, bringing with it a more active and engaged management style. IntelBroker is an individual (or group of criminal hackers) operating in the dark web, among underground resources such as XSS, BreachForums, and Exposed. They

The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones

If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in my opinion, poses a security risk.I decided to publish it because I was not aware of this behavior, and most of the people I asked about it were not aware of it either.I would like to thank Microsoft’s MSRC for their prompt response to my report and the additional information they provided. If you were already aware of the behavior shown in the following video, you can save yourself the trouble of

The Hackers Choice – 30 years of hacking without trying to get rich!

Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren’t criminals, they were pioneers, fueled by an insatiable thirst for knowledge.  Unraveling the secrets of communication networks like GSM, pushing the boundaries of computer technology. These weren’t just technical feats, they were groundbreaking discoveries.  Forget online forums and instant messaging , these trailblazers forged connections in a world of limited resources. But how? What fueled their relentless curiosity? What environment fostered such groundbreaking innovation?  Prepare to journey back to a bygone era, where breakthroughs like Nmap fingerprinting emerged from the shadows, and passion

Europol Breached: Secret Documents for Sale on the Dark Web

July 6, 2024: A well-known user of the BreachForums, IntelBroker, has recently announced the sale of a collection of crypto-related documents stolen from Europol’s EPE platform. The data breach, which occurred in May 2024, involved the theft of critical files and documents. Breach Details The EPE (Europol Platform for Experts) platform is a secure system used by Europol for sharing sensitive information among European law enforcement agencies. The breach allowed hackers to access valuable information, potentially jeopardizing several ongoing investigations. Reportedly, IntelBroker has uploaded a small amount of these documents to the forum as proof of the successful breach. In a post

Taylor Swift’s Tour at Risk: Hacker Demands $2 Million from Ticketmaster for 170k Stolen Barcodes

A cyber incident has hit Ticketmaster, with a malicious actor issuing a ransom demand, threatening to release sensitive data unless a payment of $2 million USD is made. The hacker claims to possess 170,000 barcodes related to Taylor Swift’s ERAS tour events, along with a vast amount of additional data, including user information and barcodes for numerous other events. Ransom Details and Compromised Tickets According to the cybercriminal, the compromised barcodes include tickets for Taylor Swift’s concerts on the following dates and locations: In a statement, the hacker threatens to release all 680 million user records and 30 million additional event barcodes

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia

Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist, naturalised in Australia, who deals with quantum engineering at the School of Electrical Engineering and Telecommunications and is the Program Manager at the ARC Center of Excellence for Quantum Computation and Communication Technology (CQC2T) at the University of New South Wales in Australia. Morello’s research focuses primarily on the design and construction of the basic components of a quantum computer using the spins of individual atoms in silicon. His team was the

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!

Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various types, but what does it conceptually mean to perform an injection? After some thought, I believe I have a “universal” answer. Explaining Injections Simply Let’s take a simple example. We have a request to make to the county’s office, to obtain a certificate. The request form is as follows: The undersigned __________________________ requests the certificate of residence from the office of “Random County”. Normally, the form should be filled out by writing our “name” in the appropriate

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV – The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its crew, led by Admiral James Tiberius Kirk, tasked with the exploration of new worlds and researching new civilisations, is forced to embark on a risky journey back in time. The objective: return to Earth, to 20th-century California, to solve complex energy and environmental issues. The mission entrusted to the crew by Starfllet is to recover and transport two of the last whale specimens to the 23rd century, to try to save their