Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
2nd Edition GlitchZone RHC 970x120 2

Author: Olivia Terragni

Tecno-ottimismo VS potere del controllo IA

Techno-optimism vs. the power of control: are we the greatest threat from AI?

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn’t a dystopian vision, but rather the landscape of artificial intelligence (AI) today. On one side, techno-optimism points to a future of technological abundance with trillion-dollar investments; on the other, the alarm of experts who maintain that controlling a superintelligent AI may be impossible . Between these poles, some criticism of the incoherent anti-technology narrative comes in. But to understand what’s happening, we need to look more closely, perhaps equipped with some superpower granted by human wisdom,

Tu vali empowerment ai giovani visione di Nicola Bellotti

“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision

We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as adults, we struggle to understand it. We often wonder how to protect them , less so how to equip them . In short, we’re talking about empowerment , the process that enables them to act autonomously and responsibly, even in the non-linear digital world where they spend most of their lives, between an “online self” and an “offline self.” It’s not just about providing them with technological skills, but above all about developing critical awareness , the

cybercognitivismo fabrizio saviano intervista

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet – due to the Russia-Ukraine conflict – has increased significantly. In recent years, ransomware attacks have pushed Italy to third place among the countries most attacked by cybercriminals, but it is also true that threats vary over time and often in completely unexpected ways. For this reason, we must learn to protect our organization and our systems.  As we have seen, a series of DDoS (Distributed Denial of Service) attacks on the Ukrainian government – starting on February 15 – have continued over time, also hitting banking institutions. On February 23, the new malware

healthcare ransomware attacks Europe Italy

Why Europe’s healthcare sector must build resilience to fight the threat of ransomware

Author: Andrea Nicelli, Head of Italy and Spain at Resilience Italy’s critical infrastructure is highly exposed to cyber threats, ranking fourth in the world and first in Europe for number of cyber-attacks faced in 2024. Despite being a critical hub for digital innovation, companies in the country face significant threats from cybercrime, particularly in healthcare, government and universities. These sectors lack basic IT security infrastructure, and the adoption of cyber insurance is minimal. Ransomware is one of the primary threats for Italian organisations, with institutions including the University of Siena, Bologna FC, and SynLab Italia breached last year. Ransomware remained the leading

hacktivismo

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System

The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 – a multi-layered Distributed Denial-of-Service (DDoS) using a botnet – claimed by by the pro-Palestinian hacktivist group Dark Storm, caused a major global outage, affecting a large number of users worldwide and disrupting its services. “There’s been (still is) a massive cyberattack against X,” Musk wrote, “We are attacked every day, but this one was done with many resources. Seems to be a large, coordinated group and/or a country involved”. X had previously (in August 2024) already suffered a DDoS attack, which

The Fall of the Human Conscience

The Fall of the Human Conscience: Programming Desensitization

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology – Ashleigh Crause tells us – is, by far, one of the most amazing inventions to date”. Although all this comes at a price, naturally. I would like to quote, before you read what Ashleigh writes, the words of Mike Featherstone: “individuals in California don’t even meet on the sidewalk anymore, but when they do it they look at everything through a square screen”. Yes, it must be like this I think, through that interface we are able to transform the concept of biological organism and physical reality into

Luca Cadonici Mobile Forenics intervista

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime

Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that “is no longer limited to reactive post-incident analysis but has evolved towards a proactive approach, aimed at prevention and threat intelligence”. Specifically, Mobile Forensics, commonly used to recover evidence in connection with a criminal investigation, today is applied to any type of crime, thanks also to the fact that digital technologies play an increasingly important role in our lives.  Mobile Forensics investigations range from traditional crimes “in which the IT aspect is a continuation of the crime itself” to “fraud, cyberstalking, sextortion, but also murder,

elezioni USA psy ops

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes

On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435 Members of the U.S. House of Representatives will be chosen. In this context, influence operations through digital echo chambers – such as digital platforms and social media – can play a critical role, shaping narratives that can influence people’s opinions, who are exposed to different types of political, scientific, cultural, conspiracy or extremist content. We already put the spotlight on a 2024 marked by provocations in the great march to the polls

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network

#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the discovery of a huge network of CSAM (Child Sexual Abuse Material) from which emerged a thousand-headed monster, Hydra and those who did it are the Electronik Tribulation Army (ETA) and the W1nterSt0rm conglomerate an OSINT and threat intelligence group committed to educating and then combating online sexual predators targeting children. The #OpChildSafety (Operation Child Safety) campaign has a long history on the Internet: many of you will remember the #OpPedoHunt operation, created

Ghost Exodus documentario storia hacker

Ghost Exodus: the story of a hacker in a documentary that has a lot to teach

Ghost Exodus through the exclusive documentary “How Hacking Ruined My Life: Ghost Exodus Story” produced by Silva Rindzevi and visible on the CyberNews Youtube channel, broke the silence to tell us the long road traveled and the consequences of what changed his life life forever, in a way that “you can’t just go back and fix everything.” He would like to do it. His story is also a warning: “prison is not made for hackers, we are not like other people”, above all we have much more to give than sitting in front of a computer screen for all our life. “If