Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
2nd Edition GlitchZone RHC 970x120 2

Author: Massimiliano Brolli

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...
Share on Facebook Share on LinkedIn Share on X

Exploring Cyberspace: States and Wars Without Geographic Borders

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between...
Share on Facebook Share on LinkedIn Share on X

Hackers: Who They Are, What They Do, and Their Role in Today’s World

The meaning of " hacker " has deep roots. It derives from the English "to hack," meaning to chip away, cut, strike, or cut. It's a powerful image, that of...
Share on Facebook Share on LinkedIn Share on X

The First Hackers in History: Hacking Is a Journey, Not a Destination

The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the history of hacking,...
Share on Facebook Share on LinkedIn Share on X

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with...
Share on Facebook Share on LinkedIn Share on X

Italy is a part of the Zero Day world! The first Italian CNAs are Leonardo and Almaviva!

Very little has been said about this event, which I personally consider strategically important and a sign of a major shift in the management of undocumented vulnerabilities in Italy. In...
Share on Facebook Share on LinkedIn Share on X

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shouldn't do...
Share on Facebook Share on LinkedIn Share on X

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of...
Share on Facebook Share on LinkedIn Share on X

Digital Decay: When the Promised Future Becomes a Cage

For decades, we have celebrated digital as the promise of a more connected, efficient, and democratic future. But today, looking around, a subtle and disturbing question arises: What if we...
Share on Facebook Share on LinkedIn Share on X

Industroyer: The Malware That Shut Down Kiev and Threatens Global Power Grids

The Industroyer malware, also known as Crashoverride, was a framework developed by Russian hackers, deployed in 2016 against Ukraine's power grid. The attack left Kiev without power for an hour....
Share on Facebook Share on LinkedIn Share on X