Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
Di Redazione RHC - 05/09/2025

The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site...

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Di Redazione RHC - 04/09/2025

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In...
Davide Cavallini - 04/04/2024 - 21:15

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network

#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about th...
Olivia Terragni - 02/04/2024 - 07:51

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information

Author: Massimiliano Brolli - March, 5th 2024 07:23English translation: Antonio Piovesan - March, 11th 2024 How can we ensure that sensitive data i...
Antonio Piovesan - 25/03/2024 - 18:49

Discover Quantum Computing

Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the di...
Tara Lie - 20/03/2024 - 10:26

How CDNs can save your website: Speed and security at the highest level

Let's talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. Ther...
Antonio Piovesan - 18/03/2024 - 11:05

Mathematics Meets Programming: A transformation journey

Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, S...
Davide Cavallini - 11/03/2024 - 20:30

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

- April 4th, 2024

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the...

  

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network

- April 2nd, 2024

#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the...

  

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information

- March 25th, 2024

Author: Massimiliano Brolli - March, 5th 2024 07:23English translation: Antonio Piovesan - March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to...

  

Discover Quantum Computing

- March 20th, 2024

Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of...

  

How CDNs can save your website: Speed and security at the highest level

- March 18th, 2024

Let's talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There's only one waiter running around...

  

Mathematics Meets Programming: A transformation journey

- March 11th, 2024

Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, Senior Programmer and Penetration Tester  This article was written...

  

Sign up for the newsletter