Red Hot Cyber. The Cybersecurity Blog

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the greatest dangers, capable of deceiving even the most vigilant and

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the discovery of a huge network of CSAM (Child Sexual Abuse

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information
Author: Massimiliano Brolli – March, 5th 2024 07:23English translation: Antonio Piovesan – March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to this critical question, Traffic Light Protocol (TLP) emerges, an information

Discover Quantum Computing
Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of advanced computing solutions based on quantum technology. In particular the

How CDNs can save your website: Speed and security at the highest level
Let’s talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There’s only one waiter running around serving all the customers. Now, if each table had its

Mathematics Meets Programming: A transformation journey
Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, Senior Programmer and Penetration Tester This article was written with the valuable collaboration of Stefano Versace, my former high

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw
Redazione RHC - July 9th, 2024
Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used...

Massive Data Exposure on X (Twitter) Affects 200 Million Users
Pietro Melillo - July 8th, 2024
Recently, X (Twitter) experienced a massive data exposure, compromising nearly 200 million user records. This incident could be one of the largest user data exposures in recent history, jeopardizing the...

Alleged NATO Data BreachAlleged NATO Data Breach: 643 CSV Files with User Data and Server Details Leaked
Pietro Melillo - July 8th, 2024
A threat actor claims to have leaked sensitive data from NATO - TIDE (Think-Tank for Information Decision and Execution Superiority). NATO-TIDE (Think-Tank for Information Decision and Execution Superiority) is a...

Access to UK Accounting System for Sale: 600 Clients and 1TB of Data at Risk
Pietro Melillo - July 8th, 2024
A malicious actor is allegedly selling access to an RDWeb system in the United Kingdom, belonging to an accounting firm. This breach represents a serious threat to the security of...
Sign up for the newsletter