Red Hot Cyber. The Cybersecurity Blog

Signal towards the Future: Post Quantum Cryptography now protects our messages
Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making it resistant to future attacks by quantum computers. Quantum computers – that at the moment

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!
Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various types, but what does it conceptually mean to perform an injection? After some thought, I

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company
A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the most loyal conditions for returning their data”. As RHC, we contacted them, and their approach

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility
Summary: 1. The cyber aggression on Albania.- 2. A legal analysis of cyber aggression.- 3. The problem of cyber malicious activities attribution.- 4. The role of private security companies in attribution: performing government-like tasks? – 5. Concluding remarks. 1. The

The History of the Unix Operating System (Part 2)
Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV – The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its crew, led by Admiral James Tiberius Kirk, tasked with the

The History of the UNIX operating system (Part 1)
Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used across the world, and is so versatile that it can be used on any type

Latvian Government Database Compromised: Over 1.6 Million Government Data Lines!
Pietro Melillo - July 8th, 2024
A malicious actor has claimed to have leaked a database containing over 1.6 million lines of data from the Latvian government. The data breach, dated July 7, 2024, includes all...

Threat Actors Steal 5.90 GB of Sensitive Data from the Fiscalía General del Estado de Veracruz!
Pietro Melillo - July 8th, 2024
In an era where cybersecurity has become crucial for protecting sensitive data, a recent leak has revealed an alleged security breach at the Fiscalía General del Estado de Veracruz. A...

Dangerous 0day Windows LPE Vulnerability for Sale in the Underground
Pietro Melillo - July 7th, 2024
A malicious actor, under the name "tikila", has posted an advertisement on a hacking forum for the sale of a local privilege escalation (LPE) vulnerability for Windows. According to the...

Europol Breached: Secret Documents for Sale on the Dark Web
Pietro Melillo - July 7th, 2024
July 6, 2024: A well-known user of the BreachForums, IntelBroker, has recently announced the sale of a collection of crypto-related documents stolen from Europol's EPE platform. The data breach, which...
Sign up for the newsletter