Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

- July 3rd, 2025 - (Posted in Hacking revolution)
The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic humor, of memes, but above all culture, engineering and science. But while Linux has its penguin, BSD has its daemon and Perl His camel, what has always...

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future

Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos” is the name retrospectively used by journalist Steven Levy, in his 1994 book ‘Insanely Great’, to describe a revolutionary demonstration held on a rainy Monday, 9th December 1968, at

Vannevar Bush’s Visionary Essay: “As We May Think”.

Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a source of inspiration for many scientists that have contributed to technological innovation, especially in computer science in the years following

RHC ransomware Data Room – January 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the security agendas of many companies, organizations, and beyond. The disruptive

Satoshi Nakamoto: let’s discover the mysterious inventor of Bitcoin.

Autore: Brolli Massimiliano Translate: Vincenzo Marcovecchio Pubblication date: 1/06/2021 The true identity of the creator of Bitcoin is one of the greatest mysteries in the tech world. Over the years, many theories have emerged about who Satoshi Nakamoto really is,

Nuclear rearmament, cyber guerrillas and cyber crime.

Author: Roberto Villani Tanslate: Vincenzo Marcovecchio Pubblication date: 19/12/2021 Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s that we have left for more than

Why privacy does not exist.

Author Massimiliano Brolli Translation: Vincenzo Marcovecchio Pubblication date: 18/12/2021 Privacy, privacy, privacy, … privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work, we

Threat Actors Steal 5.90 GB of Sensitive Data from the Fiscalía General del Estado de Veracruz!

- July 8th, 2024

In an era where cybersecurity has become crucial for protecting sensitive data, a recent leak has revealed an alleged security breach at the Fiscalía General del Estado de Veracruz. A...

  

Dangerous 0day Windows LPE Vulnerability for Sale in the Underground

- July 7th, 2024

A malicious actor, under the name "tikila", has posted an advertisement on a hacking forum for the sale of a local privilege escalation (LPE) vulnerability for Windows. According to the...

  

Europol Breached: Secret Documents for Sale on the Dark Web

- July 7th, 2024

July 6, 2024: A well-known user of the BreachForums, IntelBroker, has recently announced the sale of a collection of crypto-related documents stolen from Europol's EPE platform. The data breach, which...

  

The New RockYou2024 Collection has been published! 10 Billion Credentials Compromised

- July 6th, 2024

Everyone involved with CTF has used the infamous rockyou.txt wordlist at least once, mainly to perform password cracking activities. The file is a list of 14 million unique passwords originating from the 2009...

  

Sign up for the newsletter