Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Ancharia Desktop 1 1

Author: Diego Bentivoglio

Securing WebSocket Connections: Risk, Analysis, and Practical Measures

WebSockets offer persistent two-way communication between client and server, essential for real-time applications like chat, gaming, dashboards, and notifications. However, this persistence introduces specific attack surfaces: if the channel or its rules are not adequately protected, data exfiltration, session hijacking, and vulnerabilities related to unfiltered input can occur. This article provides a practical explanation of the most significant risks and essential countermeasures for protecting this type of connection. But what makes WebSockets risky? Their useful features include long connections, bidirectional traffic, and extremely low latency, which simultaneously create opportunities for attackers. A persistent connection means that a single breach can maintain access

Mathematical Security: From Number Theory to Hacking and Pentesting

When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there’s a deeper level, unseen and unsurpassed: the laws of mathematics. Because while software can be hacked, protocols can be bypassed, configurations can be messed up, mathematics cannot be corrupted. And it is precisely on this pillar that modern cybersecurity is based. Because safety is (also) mathematics Every digital defense technology works not because “someone programmed it well,” but because it exploits mathematical problems that have no efficient solution. Here are some concrete examples: RSA: It is based on the difficulty of factoring numbers of hundreds of

LilyGO T-Embed CC1101 and Bruce Firmware, the community makes studying Rolling Code possible

Research into radio frequency security never stops. In recent years, we’ve seen the emergence of increasingly accessible tools that have brought the world of RF hacking beyond academic laboratories. One device attracting considerable attention is the LilyGO T-Embed CC1101, a small platform based on the ESP32 and the Texas Instruments transceiver. Thanks to the tireless work of the developer community, it has made a fundamental leap forward. With the latest version of the Bruce firmware, this device is now capable of capturing RF signals in RAW format. This means we’re no longer talking about simple replications, but rather in-depth analysis that allows