Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
970x20 Itcentric

Author: Massimiliano Brolli

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program’s primary purpose was cyber espionage, aimed at gathering intelligence in Middle Eastern countries. Russian cybersecurity firm Kaspersky Labs told the BBC that it believes the malware, known as Flame, has been operational since August 2010, so it’s likely that its development occurred very close to the time the Stuxnet malware was written. The malware is highly sophisticated, though unconfirmed, and appears to have been written by US-sponsored experts in conjunction with the Israeli

Exploring Cyberspace: States and Wars Without Geographic Borders

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between the beauty of always being connected and the threats that constantly impact it, I’d like to tell you a story, one that is as simple as possible but useful in helping you understand the importance that cybersecurity has in all of our lives today. Are you ready? Let’s go. In June 2009, the US and Israeli governments, as part of the “2006 Olympic Games” operation promoted by Bush, created a computer virus

Hackers: Who They Are, What They Do, and Their Role in Today’s World

The meaning of ” hacker ” has deep roots. It derives from the English “to hack,” meaning to chip away, cut, strike, or cut. It’s a powerful image, that of a farmer breaking up clods of earth with his rough hoe, revealing what lies beneath the surface. Likewise, a hacker can explore the darkest recesses, challenging their limits and bringing to light powerful innovations unlike anything anyone has ever seen before. But who are hackers really? In this article, we’ll explore the hacker from every angle. We’ll look at who they are, their motivations, and their role in today’s digital world. We’ll

The First Hackers in History: Hacking Is a Journey, Not a Destination

The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the history of hacking, where it all began, precisely on the ground floor of Building 26 at MIT (Massachusetts Institute of Technology), precisely in 1958 at the Tech Model Railroad Club, by model railway enthusiasts. The club, which ran a very sophisticated model railway, was drastically divided into two factions: The system was constantly improved, renewed, perfected, especially when it became “gronked,” in club slang meaning “ruined.” The freshmen collaborated with the senior members, but all

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with a phenomenon that generates scams of all kinds. This column aims to raise awareness among everyone about the ever-increasing number of online scams, primarily originating from emails and social networks. This will be done through first-person stories told by the unfortunate victims, providing a final lesson learned. Author : Massimiliano Brolli Pasquale’s experience Hi guys, my name is Pasquale, I’m 55 years old and I’ve had an online bank account for a

Italy is a part of the Zero Day world! The first Italian CNAs are Leonardo and Almaviva!

Very little has been said about this event, which I personally consider strategically important and a sign of a major shift in the management of undocumented vulnerabilities in Italy. In March 2024, I wrote an article describing a nearly bleak Italian landscape: the culture of undocumented bugs, or zero-days, was practically nonexistent, and there was no active CNA (CVE Numbering Authority) in our country. Vulnerability management is often left to chance or, worse, hidden behind a veil of secrecy and incapable of fostering dialogue with the research community. That piece, published on Red Hot Cyber, ricocheted across social media and sparked widespread

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

Have you ever been told that if you find a USB flash drive on the ground, you shouldn’t plug it into your computer? Today, we’ll explain why you shouldn’t do that through a proof of concept (PoC). In this post, we’ll show you how to create a malicious USB that can infect a computer in seconds. A few lines of history. In 2010, the media reported a virus that had successfully infected a nuclear power plant in Iran. This malware, called Stuxnet, slowed down the centrifuges that enriched uranium, increasing the pressure to critical points. The plant had sensors that allowed it

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of Georgia, has predicted that a new revolution is coming. But when will all this happen? In fact, it’s already happening. What is wetware? Since 1996, Potter has been involved in cutting-edge research on “the possibilities for developing hardware-enhanced cognition in people.” In fact, in the essay “The future of computing and neural interfacing“, Potter describes that all life as we know it is made of cells, which are “soft and full of

Digital Decay: When the Promised Future Becomes a Cage

For decades, we have celebrated digital as the promise of a more connected, efficient, and democratic future. But today, looking around, a subtle and disturbing question arises: What if we have truly entered the era of digital decadence? An era in which technology, once the engine of progress, is turning into a heavy burden, leading to misinformation, dependency, and above all, dehumanization—where digital promises us everything, but slowly takes away what makes us human. In this article, I want to share some “signals” that I have been observing for some time and trying to contextualize. Subtle but increasingly evident clues show how

Industroyer: The Malware That Shut Down Kiev and Threatens Global Power Grids

The Industroyer malware, also known as Crashoverride, was a framework developed by Russian hackers, deployed in 2016 against Ukraine’s power grid. The attack left Kiev without power for an hour. The malware was considered an evolution of previous strains such as Havex and BlackEnergy, which had previously been used against power grids. However, unlike Havex and BlackEnergy (which were more similar to generic Windows malware deployed against systems running industrial systems), Industroyer contained components specifically designed to interact with Siemens power grid equipment. The Industroyer malware Six months after a hacking attack that caused a blackout in Kiev, Ukraine, security researchers warned