Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

- March 18th, 2025 - (Posted in Cyber politics)
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the U.S. government in preventing access to “strong enough” cryptography for foreign nationals and states were numerous from 1990 onward. Dubbed...

ClamAV

ClamAV and signatures generation

- May 2nd, 2024

Threat intelligence has many fields of application, starting from control of infrastructures using automation processes to security increasing the perimeter of applications and solutions in general. One of the most...

  

Loki, starting IOC discovering

- May 2nd, 2024

Today is always more important and significant to be efficient in controlling our own infrastructures; actions to put in place for this verification process shall require both proactive and post-action...

  

Flipping pages, from userland to godmode

- April 6th, 2024

Traslate: Antonio Piovesan On X, Lau (@notselwyn) (https://twitter.com/notselwyn/) released a blogpost on 26 March at https://pwning.tech/nftables/ describing an elaborate attack on the Linux kernel that allows privilege escalation by exploiting...

  

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

- April 4th, 2024

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the...

  

Sign up for the newsletter