
Anubi, the EDR for your malware and network security
In the current modern context where a cyber war is in progress, the concept of cybersecurity awareness and perimeter fortification is increasingly necessary. In this

PRAISE TO VX-UNDERGROUND – The hack-library turns 5!
Every nerd or technology enthusiasts cannot deny the influence of the 1980s on modern computer science. Commodore Amiga, Nintendo, Apple II, now computers are affordable

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia
Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor

ClamAV and signatures generation
Threat intelligence has many fields of application, starting from control of infrastructures using automation processes to security increasing the perimeter of applications and solutions in

Loki, starting IOC discovering
Today is always more important and significant to be efficient in controlling our own infrastructures; actions to put in place for this verification process shall

Flipping pages, from userland to godmode
Traslate: Antonio Piovesan On X, Lau (@notselwyn) (https://twitter.com/notselwyn/) released a blogpost on 26 March at https://pwning.tech/nftables/ describing an elaborate attack on the Linux kernel that

Critical Apache Tomcat Vulnerability CVE-2024-34750 Could Bring Your Server to a Halt!
Raffaela Crisci - July 5th, 2024
The vulnerability CVE-2024-34750 in Apache Tomcat, as described in the security bulletin AL01/240705/CSIRT-ITA, concerns an issue that can be exploited to overload the server's computing resources, leading to a Denial...

Threat Actors: Alleged Data Breach of Ukraine Traffic Police
RHC Dark Lab - July 5th, 2024
Recently, a threat actor in an underground forum published an alleged data breach. The leak purportedly involves sensitive information from the Ukraine traffic police (GAI). The data, spanning millions of...

Serious Vulnerability in Windows Systems: Here’s How an Attacker Can Gain Complete Control of Your PC
Alessio Stefan - July 5th, 2024
A severe security vulnerability has been discovered in MSI Center, a widely used software on Windows systems. This flaw, classified as CVE-2024-37726 and with a CVSS score of 7.8 (high), allows a low-privileged attacker...

Medusa Ransomware claims responsibility for the attack on Harry Perkins Institute
Alessio Stefan - July 5th, 2024
On July 3, 2024, the Australian research institute Harry Perkins was the victim of a ransomware attack claimed by MEDUSA on their official DLS. More than 4.6 Terabytes of CCTV...
Sign up for the newsletter