Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.
Di Redazione RHC - 02/11/2025

We recently published an in-depth article on the “theft of the century” at the Louvre , in which we highlighted how physical security – access, environmental control, surveillance – is...

Immagine del sito
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 02/11/2025

Have you always thought that the Dark Web is frequented by cybercriminals? Have you always thought that the Dark Web is a dangerous and treacherous network? Today we want to dispel this myth and raise...

Immagine del sito
AWS and Azure Disruption: Vendor Dependence Is a Serious Risk
Di Redazione RHC - 02/11/2025

On October 29, a massive outage of Microsoft ‘s Azure cloud platform caused global disruptions, disrupting business and public services for over eight hours. The incident affected numerous custo...

Immagine del sito
Windows 7 Shrinks to 69MB: A Minimalist’s Achievement
Di Redazione RHC - 02/11/2025

Windows minimalists have set another record. Enthusiast @XenoPanther has reduced the size of a running copy of Windows 7 to 69 megabytes , smaller than the average mobile app. By comparison, a standar...

Immagine del sito
OpenAI may have lost $12 billion in its latest fiscal quarter.
Di Redazione RHC - 01/11/2025

Microsoft’s financial report indicates that OpenAI may have lost $12 billion in its latest fiscal quarter. An expense in Microsoft’s earnings report (517.81, -7.95, -1.51%) surprised analy...

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company

A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the mo...
Redazione RHC - 14/07/2023 - 15:46

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility

Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubbli...
Redazione RHC - 30/03/2023 - 17:06

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV - The Voyage Home, directed by Leonard Nimoy (USA, 1986, ...
Tara Lie - 31/01/2023 - 23:27

The History of the UNIX operating system (Part 1)

Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operatin...
Carlo Denza - 28/12/2022 - 13:55

Hacker gang OPERA1ER stole $11 million from African companies

Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration witht...
Redazione RHC - 07/11/2022 - 09:26

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”

Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an...
Tara Lie - 06/09/2022 - 17:29

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company

- July 14th, 2023

A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the most loyal conditions for returning...

Facebook Linkedin X

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility

- March 30th, 2023

Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubblicato su Newsletter SIOI, Osservatorio sulle attività delle Organizzazioni Internazionali e...

Facebook Linkedin X

The History of the Unix Operating System (Part 2)

- January 31st, 2023

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV - The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its...

Facebook Linkedin X

The History of the UNIX operating system (Part 1)

- December 28th, 2022

Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used across the world, and is...

Facebook Linkedin X

Hacker gang OPERA1ER stole $11 million from African companies

- November 7th, 2022

Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researchers from Orange CERT Coordination Center. The report takes a deep dive into financially motivated attacks of...

Facebook Linkedin X

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”

- September 6th, 2022

Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an Italian electronics pioneer. In the 60’s he worked for Olivetti,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE