Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

PRAISE TO VX-UNDERGROUND – The hack-library turns 5! Cybercrime

PRAISE TO VX-UNDERGROUND – The hack-library turns 5!

Every nerd or technology enthusiasts cannot deny the influence of the 1980s on modern computer science. Commodore Amiga, Nintendo, Apple...
Alessio Stefan - May 19, 2024
RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia Hacking

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia

Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has...
Tara Lie - May 14, 2024
ClamAV and signatures generation Cybercrime

ClamAV and signatures generation

Threat intelligence has many fields of application, starting from control of infrastructures using automation processes to security increasing the perimeter...
Andrea Cavallini - May 2, 2024
Loki, starting IOC discovering Cybercrime

Loki, starting IOC discovering

Today is always more important and significant to be efficient in controlling our own infrastructures; actions to put in place...
Andrea Cavallini - May 2, 2024
Flipping pages, from userland to godmode Cybercrime

Flipping pages, from userland to godmode

Traslate: Antonio Piovesan On X, Lau (@notselwyn) (https://twitter.com/notselwyn/) released a blogpost on 26 March at https://pwning.tech/nftables/ describing an elaborate attack...
Sergio Corpettini - April 6, 2024
Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy! Cybercrime

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary...
Davide Cavallini - April 4, 2024

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE