Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continuous improvements in the underground for AI abuse A...

The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October 22, 2025, several French crown jewels...

Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U...

Cisco has published two new critical vulnerabilities affecting Cisco Unified Contact Center Express (CCX) , the platform used by thousands of companies to manage contact centers and unified communicat...

In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artificial intelligence to public safety . The event open...
Electronic warfare (EW) between the USA, China, South and North Korea (part two)
North Korea’s cyberwarfare and its cyber army (part one)
Making the cyber world a safer and better place: an interview with W1ntermute
Ada Lovelace and Charles Babbage, pioneers of programmable computing
Dharma/Crysis: Overview and adversary tracking
Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)
Electronic warfare (EW) between the USA, China, South and North Korea (part two)
Olivia Terragni - December 17th, 2021
Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of...

North Korea’s cyberwarfare and its cyber army (part one)
Olivia Terragni - December 17th, 2021
Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it,...

Making the cyber world a safer and better place: an interview with W1ntermute
Olivia Terragni - November 12th, 2021
Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Ada Lovelace and Charles Babbage, pioneers of programmable computing
Antonio Piovesan - October 4th, 2021
Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and...

Dharma/Crysis: Overview and adversary tracking
Emanuele De Lucia - September 17th, 2021
Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)
Antonio Piovesan - August 22nd, 2021
Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

