Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Banner Ancharia Desktop 1 1

Author: Marcello Filacchioni

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media

The Red Hot Cyber Community had the opportunity to participate in “Beyond the Screen,” the Postal Police’s important initiative for young people on October 2nd , with the aim of encouraging them to experience reality beyond the confines of social networks . This event confirms how, for several years now, cybersecurity awareness has become a fundamental pillar of youth training. Rome’s Auditorium Parco della Musica , packed with over 1,200 students from the capital and its province , hosted the meeting promoted by the State Police, in collaboration with Google and One More Pictures . The initiative is part of the 13th

NIST Towards Post-Quantum Cryptography

NIST , through its National Cybersecurity Center of Excellence (NCCoE) , has released the first draft of a new document dedicated to post-quantum cryptography (PQC) . Cryptographic algorithms have always protected our most sensitive digital data from unauthorized access. So far, they’ve worked well, as even the most powerful computers haven’t been able to break them. But a challenge looms on the horizon: quantum computers , which could one day break traditional algorithms and expose information currently considered secure. This requires new algorithms that can withstand both current and future quantum computers. This is where PQC , or “quantum-resistant” cryptography, comes in.

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that of “AI agents.” From Endpoint to Agent: The Evolution of Digital Defense For years, CrowdStrike has led the industry with endpoint protection and its Endpoint Detection and Response model. Today, the same approach is being applied to artificial intelligence. With the acquisition of the startup Pangea , the company aims to secure every aspect of enterprise AI: from models to virtual agents, to simple conversations with a chatbot. This is how the

Netshacker: Retrogaming e Hacking Reale su Commodore 64

In the Commodore 64 gaming landscape, Netshacker stands out as a project that challenges the conventions of modern gaming, taking gamers back to the roots of 1980s home computing. This isn’t just a nostalgic homage, but a small, authentic and believable hacking experience, developed with the technical precision of an engineer and the passion of a retro gamer. A revolutionary concept for the C64. Netshacker isn’t a game that “pretends” to be retro: it’s a product born from an old-school mentality, but built with the care and precision of a modern project. The goal is clear: to recreate the authentic experience of