Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

- May 15th, 2025 - (Posted in Cyber politics)
In recent years, political attention has expanded beyond the national borders of different states. Since the now outdated pandemic caused by COVID-19 and the (re)emergence of different conflicts in different parts of the world have expanded public information by bringing statements and decisions to the table at the supranational level....

Signal towards the Future: Post Quantum Cryptography now protects our messages

- September 25th, 2023

Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making it resistant to future attacks...

  

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!

- July 26th, 2023

Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various types, but what does it...

  

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company

- July 14th, 2023

A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the most loyal conditions for returning...

  

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility

- March 30th, 2023

Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubblicato su Newsletter SIOI, Osservatorio sulle attività delle Organizzazioni Internazionali e...

  

Sign up for the newsletter