Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Loki, starting IOC discovering

Today is always more important and significant to be efficient in controlling our own infrastructures; actions to put in place for this verification process shall require both proactive and post-action...

Flipping pages, from userland to godmode

Traslate: Antonio Piovesan On X, Lau (@notselwyn) (https://twitter.com/notselwyn/) released a blogpost on 26 March at https://pwning.tech/nftables/ describing an elaborate attack on the Linux kernel that allows privilege escalation by exploiting...

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the...

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information

Author: Massimiliano Brolli - March, 5th 2024 07:23English translation: Antonio Piovesan - March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to...

Discover Quantum Computing

Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of...

How CDNs can save your website: Speed and security at the highest level

Let's talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There's only one waiter running around...

Mathematics Meets Programming: A transformation journey

Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, Senior Programmer and Penetration Tester  This article was written...

Scam Alert: How I Almost Fell for a Million-Dollar

My name is Elena and I am a 35-year-old housewife. One day, while I was checking my email, I found a mail that caught my attention. The sender introduced himself...

HijackLoader Expands Techniques to Improve Defense Evasion 

Donato Onofri e Emanuele Calvelli Endpoint Security & XDR CrowdStrike. HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling A recent HijackLoader variant employs sophisticated techniques to...

The Deception of the Wallet: A Journey into the World of Scammers

Giorgio sat in the self-help circle, the dim candlelight dancing on the walls. The eyes of the other participants were fixed on him, waiting for him to speak. It was...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE