Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
Davide Cavallini - April 4th, 2024
In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the...
Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
Olivia Terragni - April 2nd, 2024
#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the...
Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information
Antonio Piovesan - March 25th, 2024
Author: Massimiliano Brolli - March, 5th 2024 07:23English translation: Antonio Piovesan - March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to...
Discover Quantum Computing
Tara Lie - March 20th, 2024
Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of...
Sign up for the newsletter