Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Banner Ransomfeed 970x120 1

Author: Davide Cavallini

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way what Cross Site Scripting is. Cross-Site Scripting, also called XSS, is a type of attack that isn’t directed at the server, like SQL injections, but at the client. It’s a JavaScript-based attack that runs in the user’s browser ( Chrome, Firefox, Internet Explorer, etc. ) when a website is visited. This may seem like an unhelpful type of attack, as the browser has various protections that protect the reading of local files

Let’s discover injections explained in a simple way

Good morning everyone. I’m Davide Cavallini, a web developer and penetration tester. Today I’m going to talk about injections. There are various types, but what does it conceptually mean to inject? I’ve thought about it, and I think I have a universal answer. Injections explained simply Let’s take a simple example. We have a request to submit to the municipality to obtain a certificate. The request form is this: Normally, the form should be filled out by writing your name in the space provided. The name itself, in computer jargon, is defined as a “ parameter ”, as it is precisely a

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the greatest dangers, capable of deceiving even the most vigilant and informed individuals. Recently, our Red Hot Cyber team, comprised of S.D., who wishes to keep their identity confidential, Davide Cavallini, penetration tester and programmer, and Davide Santoro, cybersecurity analyst, made a surprising discovery in the Italian cybersecurity landscape. It’s a particular phishing attack characterized by a sophisticated deception technique and likely originating from Iranian regions. This attack stands out for its insidious

Mathematics Meets Programming: A transformation journey

Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, Senior Programmer and Penetration Tester  This article was written with the valuable collaboration of Stefano Versace, my former high school mathematics teacher and currently a teacher at the Scientific High School. I thank him very much for participating in the drafting of the article, and also as a teacher. Giovanni Pollola, a Mechanical Engineering student at the “Luigi Vanvitelli” University, contributed to the writing, whom I thank with all my heart. Furthermore, it was reviewed by Sergio Corpettini, Advanced Project Engineer,

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!

Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various types, but what does it conceptually mean to perform an injection? After some thought, I believe I have a “universal” answer. Explaining Injections Simply Let’s take a simple example. We have a request to make to the county’s office, to obtain a certificate. The request form is as follows: The undersigned __________________________ requests the certificate of residence from the office of “Random County”. Normally, the form should be filled out by writing our “name” in the appropriate