WebSockets offer persistent two-way communication between client and server, essential for real-time applications like chat, gaming, dashboards, and notifications. However, this persistence introduces specific attack surfaces: if the channel or...
Very little has been said about this event, which I personally consider strategically important and a sign of a major shift in the management of undocumented vulnerabilities in Italy. In...
Trend Micro researchers have detected a large-scale malware campaign targeting users in Brazil. It is distributed via the desktop version of WhatsApp and is characterized by a high infection rate....
Author : Inva Malaj and Raffaela Crisci 04/10/2025 – Darkforums.st: “303” Claims 9GB Data Breach on Apple.com In the early hours of October 4, 2025, a data breach claim emerged...
The story of SoopSocks is one we, unfortunately, know well: a PyPI package that promises utility — a SOCKS5 proxy — but in reality introduces a well-orchestrated malicious implementation ....
The Red Hot Cyber Community had the opportunity to participate in "Beyond the Screen," the Postal Police's important initiative for young people on October 2nd , with the aim of...
Every time Brussels churns out a new acronym, someone in the company snorts: "More paper?" It happens. But the Data Act isn't just a stamp to add to the binder:...
Generative Artificial Intelligence (GenAI) systems are revolutionizing the way we interact with technology, offering extraordinary capabilities in the creation of text, images, and code. However, this innovation brings with it...
A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This is the belief that there's...
There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective mental block....