Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Luca Galuppi

Luca Galuppi
(133 articoli, 123 italiano, 10 inglese)133 articoli
123 italiano, 10 inglese
A lifelong technology enthusiast. I have been working in the IT field for over 15 years. I have particular experience in Firewall and Networking and deal with Network Design and IT Architectures on a daily basis. I currently serve as Senior IT Engineer and PM for an IT Consulting and Services company.

Ultimi articoli di Luca Galuppi

Google Discontinues Dark Web Report, Shifts to Active Protection
No more useless alerts. No more passive monitoring. Less than two years after its launch, Google has decided to shut down one of the most talked-about...
Domestic robots and privacy: the hidden price of the automated future
The home of the future is full of robots. Automated laundries, personal assistants, and small electronic housekeepers are all devices designed to free...
AzureHound: The “Legitimate” Tool for Cloud Attacks
AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation...
Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal
A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create ma...
Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge
While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet Explorer Mode (I...
Crimson Collective claims alleged Nintendo hack: bluff or real breach?
This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectu...
FreePBX under attack: Zero-day exploit already in use, emergency patch released
The world of VoIP telephony has once again ended up in the crosshairs of cybercriminals. This time it’s FreePBX, the open-source platform built on A...
Storm-0501: When Ransomware Moves to the Cloud
Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more “traditional” attacks on on-premise machines, no more rans...
Microsoft Teams crashes: Embedded Office documents blocked from opening
A Black Thursday for millions of Microsoft Teams users around the world. A key feature of the collaboration platform – opening embedded Office docum...
IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!
Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging t...