Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Highly advanced, adaptive malware uses AI to confuse security defenses
Di Redazione RHC - 07/11/2025

Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continuous improvements in the underground for AI abuse A...

Immagine del sito
The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Di Redazione RHC - 07/11/2025

The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October 22, 2025, several French crown jewels...

Immagine del sito
Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Di Redazione RHC - 07/11/2025

Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U...

Immagine del sito
2 critical bugs detected on Cisco Unified Contact Center Express (CCX)
Di Redazione RHC - 07/11/2025

Cisco has published two new critical vulnerabilities affecting Cisco Unified Contact Center Express (CCX) , the platform used by thousands of companies to manage contact centers and unified communicat...

Immagine del sito
China is using artificial intelligence to improve mass surveillance
Di Redazione RHC - 06/11/2025

In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artificial intelligence to public safety . The event open...

Electronic warfare (EW) between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are alrea...
Olivia Terragni - 17/12/2021 - 07:07

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps...
Olivia Terragni - 17/12/2021 - 07:07

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network se...
Olivia Terragni - 12/11/2021 - 11:31

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unpr...
Antonio Piovesan - 04/10/2021 - 11:40

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is o...
Emanuele De Lucia - 17/09/2021 - 19:08

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's v...
Antonio Piovesan - 22/08/2021 - 17:17
1 222 223 224

Electronic warfare (EW) between the USA, China, South and North Korea (part two)

- December 17th, 2021

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of...

Facebook Linkedin X

North Korea’s cyberwarfare and its cyber army (part one)

- December 17th, 2021

Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it,...

Facebook Linkedin X

Making the cyber world a safer and better place: an interview with W1ntermute

- November 12th, 2021

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Facebook Linkedin X

Ada Lovelace and Charles Babbage, pioneers of programmable computing

- October 4th, 2021

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and...

Facebook Linkedin X

Dharma/Crysis: Overview and adversary tracking

- September 17th, 2021

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Facebook Linkedin X

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

- August 22nd, 2021

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE