
Anubi, the EDR for your malware and network security
Andrea Cavallini - June 17th, 2024
In the current modern context where a cyber war is in progress, the concept of cybersecurity awareness and perimeter fortification is increasingly necessary. In this situation, target objectives are spread...

PRAISE TO VX-UNDERGROUND – The hack-library turns 5!
Alessio Stefan - May 19th, 2024
Every nerd or technology enthusiasts cannot deny the influence of the 1980s on modern computer science. Commodore Amiga, Nintendo, Apple II, now computers are affordable to everyone who could finally...

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia
Tara Lie - May 14th, 2024
Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist,...

ClamAV and signatures generation
Andrea Cavallini - May 2nd, 2024
Threat intelligence has many fields of application, starting from control of infrastructures using automation processes to security increasing the perimeter of applications and solutions in general. One of the most...
Sign up for the newsletter