Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
970x20 Itcentric

Category: Hacking revolution

Do you really know what Hacktivism means? It’s a “special message of hope!”

“Hacktivism, a special message of hope.” Thus begins the “Hacktivism Declaration”, published on July 4, 2001 by the famous hacker group Cult of the dead Cow (also called cDc or Omega). “Free speech is under siege on the fringes of the internet. Several countries are censoring access to the web…” In the beginning there was activism This is the activity that attempts to promote, impede, direct or intervene in social, political and economic reforms, with the main desire to initiate strong changes within a society through demonstrations, sit-ins, hunger strikes and much more. Following the advent of microcomputers and the rise of

The History of FreeBSD

We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from the seed of Ken Thompson’s Unix, many operating systems have taken shape over time, and apart from the infinite Linux distributions that are proposed to us every day, there are other branches of the UNIX genealogy that are making the history of computing today, which is important to know. The beginning of the project A long time ago, in 1974 at the University of California, Berkeley, Professor Bob Fabry acquired from DARPA (the Defense Advanced Research Projects Agency of

Italian Scientists: Federico Faggin, the Italian who invented the microprocessor.

Among the illustrious Italian scientists, creators of cutting-edge technological innovations (we have already talked about Per Giorgio Perotto and Leonardo Chiariglione), Federico Faggin, the Italian who designed the first microprocessor, stands out without a shadow of a doubt. Federico Faggin was born in Vicenza, Italy, in 1941 and is an Italian-American physicist, engineer, inventor and entrepreneur who has always had a technical-scientific education thanks to his attendance at the ITIS “Alessandro Rossi” and his degree in Physics from the University of Padua, which he obtained at the age of just 19. He soon obtained a short-term job at the Olivetti Electronics Laboratory.

Famous Hackers: The Story of Gary McKinnon.

A few months after the attacks on the World Trade Center, a strange message appeared on a U.S. Army computer: “Your security system is shit” it read. “I am Alone. But I will continue to disrupt at the highest levels.” The Greatest Military Cyber Attack of All Time In fact, Gary McKinnon, single-handedly scanned thousands of U.S. government machines and discovered obvious security flaws in many of them. Solo broke into nearly a hundred PCs within the Army, Navy, Air Force, NASA, and the Department of Defense between February 2001 and March 2002. Solo navigated through them for months, copying files and

Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF

The first edition of the International Cybersecurity Olympiad ended in Singapore with an excellent result for Italy. Four Italian students reached the podium, winning gold and silver medals in the competition that brought together about 150 talents from 30 countries around the world. The Italian team, led by Gaspare Ferraro and Matteo Rossi, won a gold medal Leonardo Mattei from the “Antonio Labriola” Scientific High School in Rome and Jacopo Di Pumpo from the “Marie Curie” I.T.S.O.S in Cernusco sul Naviglio. In addition,Alan Davide Bovo from the “Pascal Comandini” High School in Cesena and Stefano Perrucci from the “Enrico Fermi” Technical Institute

Herm1t Interview – From VX Heaven to the war gates!

This is the story of Herm1t, founder of VX-Heaven, hacker – currently active in protecting Ukraine from 2014 –  and founder of RUH8 in fall 2015, told by means of an interview that sought to focus on its history, values and goals, while also trying to understand what are the most important elements that distinguish the ongoing cyber war between Russia and Ukraine. In our interview with Smelly, founder of VX-Underground, we explored a world committed to openly sharing as much malware-related data as possible. By amassing samples, papers, and articles into a centralised library, VX-Underground builds upon the legacy of VX-Heaven,

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management IntroductionThe recent acquisition of BreachForums by IntelBroker marks a significant shift in the landscape of cybercrime. This transition of power occurs at a crucial time for the forum, which has recently experienced a period of stagnation and inefficiency under the previous administration. The arrival of IntelBroker as the new owner promises to renew and strengthen the platform, bringing with it a more active and engaged management style. IntelBroker is an individual (or group of criminal hackers) operating in the dark web, among underground resources such as XSS, BreachForums, and Exposed. They

The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones

If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in my opinion, poses a security risk.I decided to publish it because I was not aware of this behavior, and most of the people I asked about it were not aware of it either.I would like to thank Microsoft’s MSRC for their prompt response to my report and the additional information they provided. If you were already aware of the behavior shown in the following video, you can save yourself the trouble of

The Hackers Choice – 30 years of hacking without trying to get rich!

Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren’t criminals, they were pioneers, fueled by an insatiable thirst for knowledge.  Unraveling the secrets of communication networks like GSM, pushing the boundaries of computer technology. These weren’t just technical feats, they were groundbreaking discoveries.  Forget online forums and instant messaging , these trailblazers forged connections in a world of limited resources. But how? What fueled their relentless curiosity? What environment fostered such groundbreaking innovation?  Prepare to journey back to a bygone era, where breakthroughs like Nmap fingerprinting emerged from the shadows, and passion

Europol Breached: Secret Documents for Sale on the Dark Web

July 6, 2024: A well-known user of the BreachForums, IntelBroker, has recently announced the sale of a collection of crypto-related documents stolen from Europol’s EPE platform. The data breach, which occurred in May 2024, involved the theft of critical files and documents. Breach Details The EPE (Europol Platform for Experts) platform is a secure system used by Europol for sharing sensitive information among European law enforcement agencies. The breach allowed hackers to access valuable information, potentially jeopardizing several ongoing investigations. Reportedly, IntelBroker has uploaded a small amount of these documents to the forum as proof of the successful breach. In a post