Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European Un...

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting sp...

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware, ransomware, and una...
RHC ransomware Data Room – January 2022
Why privacy does not exist
Electronic warfare between the USA, China, South and North Korea (part two)
North Korea’s cyberwarfare and its cyber army (part one)
Making the cyber world a safer and better place: an interview with W1ntermute
Ada Lovelace and Charles Babbage, pioneers of programmable computing

RHC ransomware Data Room – January 2022
Luca Mella - February 4th, 2022
Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the...

Why privacy does not exist
Redazione RHC - December 18th, 2021
Privacy, privacy, privacy, ... privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work,...

Electronic warfare between the USA, China, South and North Korea (part two)
Olivia Terragni - December 17th, 2021
Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of...

North Korea’s cyberwarfare and its cyber army (part one)
Olivia Terragni - December 17th, 2021
Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so...

Making the cyber world a safer and better place: an interview with W1ntermute
Olivia Terragni - November 12th, 2021
Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Ada Lovelace and Charles Babbage, pioneers of programmable computing
Antonio Piovesan - October 4th, 2021
Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

