Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
Di Redazione RHC - 05/09/2025

The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site...

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Di Redazione RHC - 04/09/2025

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...

Hexstrike AI unleashes chaos! Zero-days exploited in record time
Di Redazione RHC - 04/09/2025

The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...

Signal towards the Future: Post Quantum Cryptography now protects our messages

Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protoco...
Tara Lie - 25/09/2023 - 14:06

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!

Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There ...
Davide Cavallini - 26/07/2023 - 23:27

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company

A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the mo...
Redazione RHC - 14/07/2023 - 15:46

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility

Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubbli...
Redazione RHC - 30/03/2023 - 17:06

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV - The Voyage Home, directed by Leonard Nimoy (USA, 1986, ...
Tara Lie - 31/01/2023 - 23:27

The History of the UNIX operating system (Part 1)

Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operatin...
Carlo Denza - 28/12/2022 - 13:55

Signal towards the Future: Post Quantum Cryptography now protects our messages

- September 25th, 2023

Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making it resistant to future attacks...

  

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!

- July 26th, 2023

Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various types, but what does it...

  

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company

- July 14th, 2023

A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the most loyal conditions for returning...

  

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility

- March 30th, 2023

Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubblicato su Newsletter SIOI, Osservatorio sulle attività delle Organizzazioni Internazionali e...

  

The History of the Unix Operating System (Part 2)

- January 31st, 2023

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV - The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its...

  

The History of the UNIX operating system (Part 1)

- December 28th, 2022

Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used across the world, and is...

  

Sign up for the newsletter