Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Virtual Private Network (VPN): What It Is, How It Works, and Why
Di Redazione RHC - 15/11/2025

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Immagine del sito
Password Managers: A Complete Guide to Choosing and Using Them
Di Redazione RHC - 15/11/2025

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...

Immagine del sito
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Di Riccardo Nuti - 15/11/2025

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European Un...

Immagine del sito
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Di Redazione RHC - 15/11/2025

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting sp...

Immagine del sito
Understanding Firewalls: The First Line of Defense in Cybersecurity
Di Redazione RHC - 15/11/2025

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware, ransomware, and una...

RHC ransomware Data Room – January 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recen...
Luca Mella - 04/02/2022 - 20:45

Why privacy does not exist

Privacy, privacy, privacy, ... privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we ...
Redazione RHC - 18/12/2021 - 20:59

Electronic warfare between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are alrea...
Olivia Terragni - 17/12/2021 - 07:07

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surro...
Olivia Terragni - 17/12/2021 - 07:07

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network se...
Olivia Terragni - 12/11/2021 - 11:31

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transport...
Antonio Piovesan - 04/10/2021 - 11:40

RHC ransomware Data Room – January 2022

- February 4th, 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the...

Facebook Linkedin X

Why privacy does not exist

- December 18th, 2021

Privacy, privacy, privacy, ... privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work,...

Facebook Linkedin X

Electronic warfare between the USA, China, South and North Korea (part two)

- December 17th, 2021

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of...

Facebook Linkedin X

North Korea’s cyberwarfare and its cyber army (part one)

- December 17th, 2021

Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so...

Facebook Linkedin X

Making the cyber world a safer and better place: an interview with W1ntermute

- November 12th, 2021

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Facebook Linkedin X

Ada Lovelace and Charles Babbage, pioneers of programmable computing

- October 4th, 2021

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution....

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE