Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!
Davide Cavallini - July 26th, 2023
Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various types, but what does it...
RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company
Redazione RHC - July 14th, 2023
A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the most loyal conditions for returning...
Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility
Redazione RHC - March 30th, 2023
Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubblicato su Newsletter SIOI, Osservatorio sulle attività delle Organizzazioni Internazionali e...
The History of the Unix Operating System (Part 2)
Tara Lie - January 31st, 2023
Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV - The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its...
Sign up for the newsletter