Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
LECS 970x120 1

Author: Raffaela Crisci

Discovering Tor Browser: The Digital Fortress for Online Privacy

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...
Share on Facebook Share on LinkedIn Share on X

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale

IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of billions. This announcement was made public through a post on...
Share on Facebook Share on LinkedIn Share on X

Critical Apache Tomcat Vulnerability CVE-2024-34750 Could Bring Your Server to a Halt!

The vulnerability CVE-2024-34750 in Apache Tomcat, as described in the security bulletin AL01/240705/CSIRT-ITA, concerns an issue that can be exploited to overload the server's computing resources, leading to a Denial...
Share on Facebook Share on LinkedIn Share on X

Intel CPUs Vulnerable! New “Indirector” Attack Threatens Sensitive Data Detection.

Modern Intel processors, including Raptor Lake and Alder Lake CPUs (i.e., 12th and 13th generation Intel "Core" processors), are vulnerable to a new high-precision Branch Target Injection (BTI) attack called...
Share on Facebook Share on LinkedIn Share on X

Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!

In teh last months Mac users have been targeted by a new wave of cyberattack trough malvertising campaigns. The last threat, called “Poseidon” by their creators, has been revealed this...
Share on Facebook Share on LinkedIn Share on X