Red Hot Cyber. The Cybersecurity Blog

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia
Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist, naturalised in Australia, who deals with quantum engineering at the

ClamAV and signatures generation
Threat intelligence has many fields of application, starting from control of infrastructures using automation processes to security increasing the perimeter of applications and solutions in general. One of the most common applications of this concept is antimalware tools, which enterprise

Loki, starting IOC discovering
Today is always more important and significant to be efficient in controlling our own infrastructures; actions to put in place for this verification process shall require both proactive and post-action approach: the last aspect is fundamental when an attack or

Flipping pages, from userland to godmode
Traslate: Antonio Piovesan On X, Lau (@notselwyn) (https://twitter.com/notselwyn/) released a blogpost on 26 March at https://pwning.tech/nftables/ describing an elaborate attack on the Linux kernel that allows privilege escalation by exploiting a vulnerability in nf_tables. The POC, published on Github, starting

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the greatest dangers, capable of deceiving even the most vigilant and

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the discovery of a huge network of CSAM (Child Sexual Abuse

The Threat Actor 888 claimed a compromise against Microsoft
Pietro Melillo - July 10th, 2024
On July 9, 2024, a user known as "888" posted on BreachForums claiming to have leaked sensitive data of Microsoft employees. This alleged breach has exposed personal information of 2,073...

The Threat Actor 888 claims responsibility for a breach at Nokia.
Pietro Melillo - July 10th, 2024
A malicious actor, known by the alias "888," recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of...

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw
Redazione RHC - July 9th, 2024
Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used...

Massive Data Exposure on X (Twitter) Affects 200 Million Users
Pietro Melillo - July 8th, 2024
Recently, X (Twitter) experienced a massive data exposure, compromising nearly 200 million user records. This incident could be one of the largest user data exposures in recent history, jeopardizing the...
Sign up for the newsletter