Red Hot Cyber. The Cybersecurity Blog

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the greatest dangers, capable of deceiving even the most vigilant and

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the discovery of a huge network of CSAM (Child Sexual Abuse

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information
Author: Massimiliano Brolli – March, 5th 2024 07:23English translation: Antonio Piovesan – March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to this critical question, Traffic Light Protocol (TLP) emerges, an information

Discover Quantum Computing
Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of advanced computing solutions based on quantum technology. In particular the

How CDNs can save your website: Speed and security at the highest level
Let’s talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There’s only one waiter running around serving all the customers. Now, if each table had its

Mathematics Meets Programming: A transformation journey
Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, Senior Programmer and Penetration Tester This article was written with the valuable collaboration of Stefano Versace, my former high

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”
Redazione RHC - July 24th, 2024
Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to have exposed the names, departments, and emails of 3,379 Spanish...

The other side of cybersecurity: stress and burnout are “by design” in domain experts
Redazione RHC - July 23rd, 2024
We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important point in the profession of the...

Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.
Redazione RHC - July 23rd, 2024
Elon Musk, who simultaneously heads six innovative companies-Tesla, SpaceX, Starlink, X (formerly known as Twitter), Neuralink, and xAI-is not stopping there. He recently announced that xAI has begun training its...

Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11
Redazione RHC - July 23rd, 2024
Microsoft has released a tool for system administrators to simplify the process of fixing the blue screen of death (BSOD) on Windows 10 and 11 computers. The solution involves the...
Sign up for the newsletter