Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Di Giovanni Pollola - 02/09/2025

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Di Ada Spinelli - 02/09/2025

Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the A...

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
Di Redazione RHC - 01/09/2025

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classifi...

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
Di Redazione RHC - 30/08/2025

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...

Electronic warfare (EW) between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are alrea...
Olivia Terragni - 17/12/2021 - 07:07

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps...
Olivia Terragni - 17/12/2021 - 07:07

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network se...
Olivia Terragni - 12/11/2021 - 11:31

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unpr...
Antonio Piovesan - 04/10/2021 - 11:40

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is o...
Emanuele De Lucia - 17/09/2021 - 19:08

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's v...
Antonio Piovesan - 22/08/2021 - 17:17
1 120 121 122

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

- July 2nd, 2025

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...

  

Italian Scientists: Federico Faggin, the Italian who invented the microprocessor.

- July 1st, 2025

Among the illustrious Italian scientists, creators of cutting-edge technological innovations (we have already talked about Per Giorgio Perotto and Leonardo Chiariglione), Federico Faggin, the Italian who designed the first microprocessor,...

  

The first message ever sent over the internet

- July 1st, 2025

Today exchanging a message via WhatsApp or Skype is a normal gesture, which is part of the activities we carry out in our daily lives. In all history books, it...

  

The Founding Fathers of the Hacker Community. Hacking is a journey, not a destination!

- July 1st, 2025

It was at the Tech Model Railroad Club that it all began, we talked about it in a previous article, that famous Club of the Massachusetts Institute of Technology (MIT)...

  

Sign up for the newsletter