Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
TM RedHotCyber 970x120 042543

Category: Hacking revolution

Taylor Swift’s Tour at Risk: Hacker Demands $2 Million from Ticketmaster for 170k Stolen Barcodes

A cyber incident has hit Ticketmaster, with a malicious actor issuing a ransom demand, threatening to release sensitive data unless a payment of $2 million USD is made. The hacker claims to possess 170,000 barcodes related to Taylor Swift’s ERAS tour events, along with a vast amount of additional data, including user information and barcodes for numerous other events. Ransom Details and Compromised Tickets According to the cybercriminal, the compromised barcodes include tickets for Taylor Swift’s concerts on the following dates and locations: In a statement, the hacker threatens to release all 680 million user records and 30 million additional event barcodes

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia

Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist, naturalised in Australia, who deals with quantum engineering at the School of Electrical Engineering and Telecommunications and is the Program Manager at the ARC Center of Excellence for Quantum Computation and Communication Technology (CQC2T) at the University of New South Wales in Australia. Morello’s research focuses primarily on the design and construction of the basic components of a quantum computer using the spins of individual atoms in silicon. His team was the

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!

Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various types, but what does it conceptually mean to perform an injection? After some thought, I believe I have a “universal” answer. Explaining Injections Simply Let’s take a simple example. We have a request to make to the county’s office, to obtain a certificate. The request form is as follows: The undersigned __________________________ requests the certificate of residence from the office of “Random County”. Normally, the form should be filled out by writing our “name” in the appropriate

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV – The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its crew, led by Admiral James Tiberius Kirk, tasked with the exploration of new worlds and researching new civilisations, is forced to embark on a risky journey back in time. The objective: return to Earth, to 20th-century California, to solve complex energy and environmental issues. The mission entrusted to the crew by Starfllet is to recover and transport two of the last whale specimens to the 23rd century, to try to save their

The Superuser Story – The History of #root

Author: Massimiliano BrolliTranslator: Tara Lie In the beginning there was the Word… Computers, before passing into the era of transistors, were cyclopean machines – heavy and hungry for electricity. They used thermionic valves or vacuum tubes to work, and then were only able to perform very small computations. Let’s discuss for example the ENIAC, 1945, the first digital general-purpose computer, created to solve problems regarding the calculation of the ballistic curves of bullets. The Electronic Numerical Integrator and Computer (ENIAC) This gigantic computer took up 1800 square feet of space, and would consume about 150 kilowatts of power. It is said that the very

Spacewar! The Story of the First Video Game Created by Hackers at MIT

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie In this exciting story, we will catapult ourselves back to 1958 to MIT’s Tech Model Railroad Club and meet Steve Russel, Steve was one of the first hackers and wrote one of the first video games in history, and the very first with a connected Gamepad. The Tech Model Railroad Club The TMRC was an exclusive club, as we have already seen, which was frequented by brilliant and interesting characters. They often fit into the classic “geeky” stereotype – bespectacled individuals, not particularly athletic or tall, and more likely to have a ruler in their pockets

The Founding Fathers of the Hacker Community

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie Hacker culture was brought to life thanks to computer scientist Richard Greenblatt and mathematician Bill Gosper at the Massachusetts Institute of Technology (MIT). It all started at MIT’s famous Tech Model Railroad Club (TMRC), which we discussed in a previous article. Today, I would like to talk about programmer and computer scientist Richard Greenblatt, born on Christmas day 1944 in Portland, Oregon. Greenblatt was an expert chess player, and from nine years old he would take apart old radios and televisions to figure out how they worked internally. He would also build amplifiers, modulators, oscilloscopes and

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This is incredibly challenging. Of course, it’s not that easy in this traditionally male-dominated industry. Women represent only 25 percent of the global cybersecurity workforce in the world, even less are those more inspiring. Therefore, who can inspire us more than a hacker – a Former Electronik Tribulation Army member – that captures, profiles, and reports online sexual predators? Yes, cyberspace allows people to share information, ideas, create business transcending space and time,