Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Di Redazione RHC - 04/09/2025

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...

Hexstrike AI unleashes chaos! Zero-days exploited in record time
Di Redazione RHC - 04/09/2025

The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...

LockBit 5.0: Signs of a New and Possible “Rebirth”?
Di Pietro Melillo - 03/09/2025

LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Fol...

The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
Di Redazione RHC - 03/09/2025

The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack in history, which peaked at 11.5 Tbps. “Cloudfl...

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In...
Davide Cavallini - 04/04/2024 - 21:15

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network

#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about th...
Olivia Terragni - 02/04/2024 - 07:51

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information

Author: Massimiliano Brolli - March, 5th 2024 07:23English translation: Antonio Piovesan - March, 11th 2024 How can we ensure that sensitive data i...
Antonio Piovesan - 25/03/2024 - 18:49

Discover Quantum Computing

Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the di...
Tara Lie - 20/03/2024 - 10:26

How CDNs can save your website: Speed and security at the highest level

Let's talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. Ther...
Antonio Piovesan - 18/03/2024 - 11:05

Mathematics Meets Programming: A transformation journey

Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, S...
Davide Cavallini - 11/03/2024 - 20:30

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

- July 9th, 2025

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. The group was created in 2019...

  

Claude Shannon: Father of Cryptography and Founder of the Information Age

- July 8th, 2025

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...

  

“As We May Think”. The Visionary Essay of Vannevar Bush

- July 8th, 2025

Today I would like to bring to light a revolutionary essay, a source of inspiration for many scientists who have contributed to technological innovation, especially in computer science in the...

  

Who are the most famous hackers in history?

- July 8th, 2025

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

  

Sign up for the newsletter