Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Fortinet 970x120px
Precedente Successivo

Latest news

The Founding Fathers of the Hacker Community Culture

The Founding Fathers of the Hacker Community

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie Hacker culture was brought to life thanks to computer scientist Richard Greenblatt and mathematician...
Massimiliano Brolli - June 28, 2022
The “Mother of all Demos”. Douglas Englebart’s Vision of the Future innovation

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future

Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos'' is the name retrospectively used by journalist Steven Levy,...
Redazione RHC - May 12, 2022
RHC ransomware Data Room – January 2022 Cybercrime

RHC ransomware Data Room – January 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware...
Luca Mella - February 4, 2022
Why privacy does not exist Cyber News

Why privacy does not exist

Privacy, privacy, privacy, ... privacy comes first. How many times have we heard this sentence? Yes, because we talk a...
Redazione RHC - December 18, 2021
Electronic warfare between the USA, China, South and North Korea (part two) Cyberpolitics

Electronic warfare between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we...
Olivia Terragni - December 17, 2021
North Korea’s cyberwarfare and its cyber army (part one) Cyberpolitics

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps,...
Olivia Terragni - December 17, 2021

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE