Red Hot Cyber. The Cybersecurity Blog

The History of the Unix Operating System (Part 2)
Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV – The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its crew, led by Admiral James Tiberius Kirk, tasked with the

The History of the UNIX operating system (Part 1)
Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used across the world, and is so versatile that it can be used on any type

Hacker gang OPERA1ER stole $11 million from African companies
Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researchers from Orange CERT Coordination Center. The report takes a deep dive into financially motivated attacks of the prolific French-speaking threat actor, codenamed OPERA1ER. Despite relying solely

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”
Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an Italian electronics pioneer. In the 60’s he worked for Olivetti, and led the team that built the Olivetti Programma 101

RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”
Translator: Tara Lie We often talk about the LockBit Ransomware-as-a-Service (RaaS) operation, recently remodelled as LockBit 3.0, which continues to bring important innovations to the ransomware cyber circus. Often these new alterations are so disruptive that they are adopted by other

The Superuser Story – The History of #root
Author: Massimiliano BrolliTranslator: Tara Lie In the beginning there was the Word… Computers, before passing into the era of transistors, were cyclopean machines – heavy and hungry for electricity. They used thermionic valves or vacuum tubes to work, and then were only

Meow ransomware claims attack in its Data Leak Site at HPE giant
Pietro Melillo - July 10th, 2024
Introduction Today, the ransomware gang known as Meow has claimed responsibility for a cyberattack on the multinational giant Hewlett Packard Enterprise (HPE). The claim was published on their Data Leak...

The Threat Actor 888 claimed a compromise against Microsoft
Pietro Melillo - July 10th, 2024
On July 9, 2024, a user known as "888" posted on BreachForums claiming to have leaked sensitive data of Microsoft employees. This alleged breach has exposed personal information of 2,073...

The Threat Actor 888 claims responsibility for a breach at Nokia.
Pietro Melillo - July 10th, 2024
A malicious actor, known by the alias "888," recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of...

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw
Redazione RHC - July 9th, 2024
Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used...
Sign up for the newsletter