Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
2nd Edition GlitchZone RHC 970x120 2

Tag: #cybersecurity

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed

Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been targeting companies for several months by exploiting a vulnerability in Oracle E-Business Suite, has claimed responsibility for the attack. The company filed a formal notification with the U.S. Securities and Exchange Commission , acknowledging the data breach. Logitech representatives report that the incident did not impact the company’s production or products, nor its business processes. Immediately after discovering the breach, the company engaged third-party cybersecurity experts to assist in the investigation. Logitech claims the compromised data includes limited employee and

Malware Uses Finger Command to Infect Windows Devices

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechanism is now being used in attacks disguised as harmless controls and queries offered to victims in a Command Prompt window. The finger command, once designed to retrieve user information on Unix and Linux servers, was also present in Windows. It returned the account name, home directory, and other basic information. While the protocol is still supported, its use has largely disappeared . However, for attackers, this actually represents an advantage:

The Future of Tech: How to Navigate the Digital World

There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana ‘s new work, available on Amazon , belongs to the second category: it doesn’t pretend to educate you, it pretends to make you think. And it does so without technicalities, without barriers, and without that distance that information technology often creates between the writer and the reader. Sandro Sana is a well-known figure in the world of Italian cybersecurity (CISO and director of the Cyber division of Eurosystem , teacher, communicator, member

GDPR Data Breach: Email Errors and Consequences

Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This obviously applies if the email contains personal data or if personal information can otherwise be inferred from the message. As with any data breach, assessments are necessary. In any case, the event must be recorded and documented, even if notification to the supervisory authority is not mandatory and the breach has been deemed unlikely to pose a risk to the rights and freedoms of natural persons. This is both due to the express provision of Article 33, paragraph 5 of the GDPR,

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several months, affecting various CRM-related services, and the scope of the impact continues to grow. ShinyHunters claims to have gained access to Gainsight several months ago by leveraging features gained through a hack of the Salesloft Drift integration. At the time, unknown individuals infiltrated Salesloft’s GitHub account and mined OAuth tokens used by the third-party service Drift with Salesforce . These tokens allowed them to stealthily access the data of a large number

Famous Hackers: Mafia Boy, the DDoS Wizard

Today we’ll learn about another great black hacker from the past. We’ll talk about Michael Calce, better known as Mafiaboy, one of the most famous and sought-after hackers in the world. He’s a Canadian hacker who carried out numerous hacking operations against major multinationals in the 2000s when he was 14 years old. Childhood Michael Calce was born in 1984 on the West Island of Montreal, Quebec. When he was five, his parents separated, and he lived with his mother after she won a long custody battle. Every other weekend, Michael stayed at his father’s apartment in Montreal, even though he felt

RHC DarkLab Interview Stormous Ransomware. Between history, ideology, techniques and tactics

The Stormous group represents a significant threat in the ransomware landscape: it has an established reputation for its targeted attacks and its overtly pro-Russian ideology. The group may have started operating in mid-2021, later becoming known for its aggressive presence on Telegram, its geopolitical motivations and its philosophy of attacking organisations perceived to be hostile to Russia, to which it declared its support, subsequently targeting the organisations of countries considered to be enemies, destabilising their organisations These include the United States, Western countries, India and Ukraine from 2022. However, their attacks in this way not only compromise the victims’ systems, but also

IntelBroker Claims Tesla Charging Database Breach

Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims that Tesla’s charging station database has been compromised and made available for download. At this time we cannot confirm the veracity of the news, as the organization has not yet released any official press release on its website regarding the incident. Therefore, this article should be considered as an “intelligence source”. Introduction on the violation The post, published on BreachForums, revealed that the Tesla charging station database has been made available for download. According to the announcement, the database contains approximately 116,000 records