Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.
Di Redazione RHC - 02/11/2025

We recently published an in-depth article on the “theft of the century” at the Louvre , in which we highlighted how physical security – access, environmental control, surveillance – is...

Immagine del sito
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 02/11/2025

Have you always thought that the Dark Web is frequented by cybercriminals? Have you always thought that the Dark Web is a dangerous and treacherous network? Today we want to dispel this myth and raise...

Immagine del sito
AWS and Azure Disruption: Vendor Dependence Is a Serious Risk
Di Redazione RHC - 02/11/2025

On October 29, a massive outage of Microsoft ‘s Azure cloud platform caused global disruptions, disrupting business and public services for over eight hours. The incident affected numerous custo...

Immagine del sito
Windows 7 Shrinks to 69MB: A Minimalist’s Achievement
Di Redazione RHC - 02/11/2025

Windows minimalists have set another record. Enthusiast @XenoPanther has reduced the size of a running copy of Windows 7 to 69 megabytes , smaller than the average mobile app. By comparison, a standar...

Immagine del sito
OpenAI may have lost $12 billion in its latest fiscal quarter.
Di Redazione RHC - 01/11/2025

Microsoft’s financial report indicates that OpenAI may have lost $12 billion in its latest fiscal quarter. An expense in Microsoft’s earnings report (517.81, -7.95, -1.51%) surprised analy...

Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations

Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials s...
Olivia Terragni - 15/06/2022 - 07:00

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future

Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos'' is the name retrospective...
Tara Lie - 12/05/2022 - 14:32

Vannevar Bush’s Visionary Essay: “As We May Think”.

Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a sour...
Tara Lie - 07/05/2022 - 22:28

RHC ransomware Data Room – January 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recen...
Luca Mella - 04/02/2022 - 20:45

Satoshi Nakamoto: let’s discover the mysterious inventor of Bitcoin.

Autore: Brolli Massimiliano Translate: Vincenzo Marcovecchio Pubblication date: 1/06/2021 The true identity of the creator of Bitcoin is one of the g...
Massimiliano Brolli - 27/01/2022 - 13:31

Nuclear rearmament, cyber guerrillas and cyber crime.

Author: Roberto Villani Tanslate: Vincenzo Marcovecchio Pubblication date: 19/12/2021 Why will the cyberg wars, indeed the cyber-guerrillas, be more a...
Roberto Villani - 10/01/2022 - 22:41

Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations

- June 15th, 2022

Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials save lives, prevent further crimes from being committed by perpetrators, and also provide...

Facebook Linkedin X

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future

- May 12th, 2022

Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos'' is the name retrospectively used by journalist Steven Levy, in his 1994 book ‘Insanely Great’, to describe a revolutionary...

Facebook Linkedin X

Vannevar Bush’s Visionary Essay: “As We May Think”.

- May 7th, 2022

Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a source of inspiration for many scientists that have contributed to...

Facebook Linkedin X

RHC ransomware Data Room – January 2022

- February 4th, 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the...

Facebook Linkedin X

Satoshi Nakamoto: let’s discover the mysterious inventor of Bitcoin.

- January 27th, 2022

Autore: Brolli Massimiliano Translate: Vincenzo Marcovecchio Pubblication date: 1/06/2021 The true identity of the creator of Bitcoin is one of the greatest mysteries in the tech world. Over the years,...

Facebook Linkedin X

Nuclear rearmament, cyber guerrillas and cyber crime.

- January 10th, 2022

Author: Roberto Villani Tanslate: Vincenzo Marcovecchio Pubblication date: 19/12/2021 Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE