Signal towards the Future: Post Quantum Cryptography now protects our messages
Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making
Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!
Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various
RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company
A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the
Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility
Summary: 1. The cyber aggression on Albania.- 2. A legal analysis of cyber aggression.- 3. The problem of cyber malicious activities attribution.- 4. The role
The History of the Unix Operating System (Part 2)
Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV – The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship
The History of the UNIX operating system (Part 1)
Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used
Discover Quantum Computing
Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the
How CDNs can save your website: Speed and security at the highest level
Let’s talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There’s
Sign up for the newsletter