Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Banner Ransomfeed 970x120 1

Author: Antonio Piovesan

Discovering the Deep Web and Dark Web: The Ultimate Guide

There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The dark web is often associated with shady and criminal activities that are carried out or transit on the Internet. This is not always true, but to understand how to enter the dark web, we must first know it and understand its history and motivations. In this article, we will fully understand what the deep web and the dark web are and then explain how to safely access the latter. We are all

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information

Author: Massimiliano Brolli – March, 5th 2024 07:23English translation: Antonio Piovesan – March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to this critical question, Traffic Light Protocol (TLP) emerges, an information classification system designed to facilitate sharing sensitive information between authorised entities. In this article, we will explore in detail the fundamental role of the Traffic Light Protocol (TLP) in sensitive information management, with particular emphasis on its application in Cyber Threat Intelligence. Through an in-depth analysis of its mechanisms, its benefits and implementation of the TLP, we will seek to fully understand

How CDNs can save your website: Speed and security at the highest level

Let’s talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There’s only one waiter running around serving all the customers. Now, if each table had its own dedicated waiter, the service would be much faster, right? Well, CDNs work more or less like that for your website. When someone visits your site, they usually request information from a central server that could be on the other side of the world. This can slow things down, a bit like that poor lone waiter. CDNs, on the other hand, are

Scam Alert: How I Almost Fell for a Million-Dollar

My name is Elena and I am a 35-year-old housewife. One day, while I was checking my email, I found a mail that caught my attention. The sender introduced himself as Jean-Pierre, a 60-year-old Italian-French man, terminally ill with cancer. He told me that he had no relatives or friends to leave his inheritance to, and that he had chosen me, at random, among the thousands of people he had found on the internet. He offered to donate me 2.5 million dollars, on condition that I used them to help the poor and the needy. He only asked me to reply to

The Deception of the Wallet: A Journey into the World of Scammers

Giorgio sat in the self-help circle, the dim candlelight dancing on the walls. The eyes of the other participants were fixed on him, waiting for him to speak. It was time to share his story, to unburden himself from the weight he had carried for too long. “My name is Giorgio,” he began, his voice trembling. “And I was scammed.” The faces around him leaned in. Giorgio recounted that summer day in Bristol when he found a wallet on the ground in a public park. Inside was a slip of paper with a web address, a username, and a password. Curiosity led

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution. Inventors and engineers exploit new materials and new processes: it seems to be a period of endless inventions and innovations. Steam engines are slowly replacing animals as a source of motive power. Iron ships begin to compete with sailing, rail networks expand rapidly, and the electric telegraph begins to revolutionize communications. Thriving science, engineering and new technologies guarantee limitless innovations. Engineers, architects, mathematicians, astronomers, bankers, actuaries, workers, insurance agents, statisticians, navigators, anyone

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections – often instigated through phishing emails, it’s very important/crucial to take proactive measures to help protect yourself and your organization’s security. Of course having computers and servers that are up-to-date as far as patches, antivirus and other endpoint facilities makes a big difference in reducing the overall risk of infection, but being prepared on detecting phishing emails and educating employees in your organization to also be proactive is a critical step in protection. To understand how a “phishing email” threat-actor thinks, you can take a look at Veronica Patron‘s video on