Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Banner Ransomfeed 970x120 1

Category: Hacking revolution

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of Large Language Models (LLMs), integrated directly into the technical workflow. One of the most interesting examples is LLM-Tools-Nmap , presented by Hackers Arise , which allows you to drive Nmap via natural language instructions . In practice, the template translates the request (“scan the most common web ports on this /24 at a moderate speed and output to XML”) into a correct and safe Nmap command, including timing options, NSE scripts, and

13,000 times faster than a supercomputer. Google presents Willow, the fastest quantum chip on specific algorithms

Google’s quantum AI team announced a major breakthrough in quantum computing with the unveiling of its new Willow processor, a superconducting chip with 105 qubits that it says can perform some calculations 13,000 times faster than today’s most powerful supercomputers. Willow has successfully completed the Quantum Echoes algorithm , a test designed to measure quantum chaos. Unlike the 2019 Sycamore experiment, which demonstrated quantum “supremacy” only in a highly specific, randomized test, Willow ’s results have broader scientific value, enabling the modeling of molecular structures and electronic behavior with much greater precision. Michel Devore, one of the physicists leading the project, described

Famous Hackers: The Story of Andrian Lamo

Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into prestigious companies while wandering around with his backpack to being called a “spy” by the hacker community, Adrian has been a controversial but highly interesting figure in the hacking world. Childhood and the attraction to hacking Adrián Alfonso Lamo Atwood was born in Malden, Massachusetts, USA, on February 20, 1981. He attended high school in San Francisco, but dropped out after many arguments with his teachers. He didn’t graduate but studied journalism at American River

Famous Hackers: Mafia Boy, the DDoS Wizard

Today we’ll learn about another great black hacker from the past. We’ll talk about Michael Calce, better known as Mafiaboy, one of the most famous and sought-after hackers in the world. He’s a Canadian hacker who carried out numerous hacking operations against major multinationals in the 2000s when he was 14 years old. Childhood Michael Calce was born in 1984 on the West Island of Montreal, Quebec. When he was five, his parents separated, and he lived with his mother after she won a long custody battle. Every other weekend, Michael stayed at his father’s apartment in Montreal, even though he felt

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melodies could still come to life through the glow of lamps and punched tape. The older PDP-1 computer, famous for being the birthplace of one of the first video games, suddenly spoke with the voices of the Boards of Canada, playing their composition ” Olson ” using paper tape and flashing lights. The project was implemented by Peter Samson, a hacker culture pioneer at the TMRC and an engineer and volunteer at the Computer History Museum

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN’s Linux clients that compromise basic anonymity and traffic security. The issues affect both the graphical (2.10.0) and console (2.0.1) versions. Both were tested on Ubuntu 24.04.3 LTS. The main vulnerability arises because when reconnecting to Wi-Fi or waking the system from sleep mode, the user’s true IPv6 address becomes visible. In the console client with the Internet Kill Switch feature enabled, the service automatically reports the connection resumption, but during this time the system receives IPv6 routes via Router Advertisement, causing packets to bypass

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with design assistance from Susan Kare, and has become one of the most widely used software programs in Windows history. Since its introduction, Solitaire has become incredibly popular in offices and schools, so much so that Microsoft has received complaints about lost productivity due to time spent playing it . A well-known story tells of an employee in New York City being fired after Mayor Bloomberg saw the game on his screen. In

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common in the war sector, with Europe attempting to shift some of its member states’ resources, and the United States increasingly adopting a highly protectionist economic stance, using tariffs as a means of reducing trade deficits with key countries, including China. INTRO – The Silence of the Dragons The recent decisions taken by POTUS Donald Trump regarding the Chinese economic entity are nothing more than the continuation of decisions taken in the first

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of “collaboration”. It is the fruit of the genius of Torvalds but also of many hackers/programmers scattered around the globe, who contributed, each in their own way, to the creation of a “disruptive” innovation for that period historical, where software was completely veering towards “closed source” logic. It all started with Linus Benedict Torvalds, born in Helsinki, Finland, on December 28, 1969 to Nils and Anna Torvalds. But Torvalds aside, the history of the Linux kernel introduces

Cult of the Dead Cow (cDc). The story of the most famous hacker group.

Hacker culture, as we’ve already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked about its origins in a video dedicated to the Tech Model Railroad Club, the famous club where the first hacker community took shape at the Massachusetts Institute of Technology. But much later, in the era of BBS and IRC, in that period between the 1980s and 1990s, a series of hacker groups formed around the world, which influenced and shaped hacker culture and security. IT of that historic period. In these groups, the most recognized ones, they didn’t just