Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between the bea...

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented the World Wide Web? Today we talk about Timothy Bern...

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory identity verification on adult websites , and simi...

From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new frontier: intelligent systems capable of detecting, bl...

A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled ” UNIX Original From Bell Labs V4 (See Manual for format) &...
Making the cyber world a safer and better place: an interview with W1ntermute
Ada Lovelace and Charles Babbage, pioneers of programmable computing
Dharma/Crysis: Overview and adversary tracking
Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Making the cyber world a safer and better place: an interview with W1ntermute
Olivia Terragni - November 12th, 2021
Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Ada Lovelace and Charles Babbage, pioneers of programmable computing
Antonio Piovesan - October 4th, 2021
Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and...

Dharma/Crysis: Overview and adversary tracking
Emanuele De Lucia - September 17th, 2021
Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)
Antonio Piovesan - August 22nd, 2021
Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

