Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Olivia Terragni

Olivia Terragni
(106 articoli, 92 italiano, 14 inglese)106 articoli
92 italiano, 14 inglese

Author, former journalist, graduated in Economic History - Literature and Philosophy - and then in Architecture - great infrastructure - she deepened her studies in Network Economy and Information Economics, concluded with a Master in Cyber Security and Digital Forensics and a Master in Philosophy and Digital Governance. She is passionate about technological innovation and complex systems and their management in the field of security and their sustainability in international contexts. Criminalist. Optimistic sailor. https://www.redhotcyber.com/post/author/olivia-terragni/

Ultimi articoli di Olivia Terragni

Tecno-ottimismo VS potere del controllo IA
Techno-optimism vs. the power of control: are we the greatest threat from AI?
Tu vali empowerment ai giovani visione di Nicola Bellotti
“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as...
cybercognitivismo fabrizio saviano intervista
10 steps to make your company cyber-secure: the RHC guide.
In recent weeks, cyber activity on the internet – due to the Russia-Ukraine conflict – has increased significantly. In recent years, ransomware at...
healthcare ransomware attacks Europe Italy
Why Europe’s healthcare sector must build resilience to fight the threat of ransomware
Author: Andrea Nicelli, Head of Italy and Spain at Resilience Italy’s critical infrastructure is highly exposed to cyber threats, ranking fourth in ...
hacktivismo
Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System
The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 – a multi-layered Distributed De...
The Fall of the Human Conscience
The Fall of the Human Conscience: Programming Desensitization
Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology – Ashleigh Crause tells us – is, by far, one of th...
Luca Cadonici Mobile Forenics intervista
Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime
Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that “is no longer limited to reactive post-incident...
elezioni USA psy ops
US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes
On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and ...
Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about th...
Ghost Exodus documentario storia hacker
Ghost Exodus: the story of a hacker in a documentary that has a lot to teach
Ghost Exodus through the exclusive documentary “How Hacking Ruined My Life: Ghost Exodus Story” produced by Silva Rindzevi and visible on the Cybe...
Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations
Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials save...
Electronic warfare between the USA, China, South and North Korea (part two)
Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already ...
North Korea’s cyberwarfare and its cyber army (part one)
Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surround...
Making the cyber world a safer and better place: an interview with W1ntermute
Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network secu...