Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

- June 12th, 2025 - (Posted in Cybercrime and Darknet)
Ghost Security, also known as GhostSec, is a hacktivist group which emerged in the context of the cyber war against Islamic extremism. The first actions of the group date back to the aftermath of the attack on the Charlie Hebdo newsroom, January 2015. It is considered an offshoot of the...

Flipping pages, from userland to godmode

- April 6th, 2024

Traslate: Antonio Piovesan On X, Lau (@notselwyn) (https://twitter.com/notselwyn/) released a blogpost on 26 March at https://pwning.tech/nftables/ describing an elaborate attack on the Linux kernel that allows privilege escalation by exploiting...

  

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

- April 4th, 2024

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the...

  

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network

- April 2nd, 2024

#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the...

  

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information

- March 25th, 2024

Author: Massimiliano Brolli - March, 5th 2024 07:23English translation: Antonio Piovesan - March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to...

  

Sign up for the newsletter