Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
UtiliaCS 970x120

Author: Olivia Terragni

Tecno-ottimismo VS potere del controllo IA

Techno-optimism vs. the power of control: are we the greatest threat from AI?

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn't a dystopian vision, but...
Share on Facebook Share on LinkedIn Share on X
Tu vali empowerment ai giovani visione di Nicola Bellotti

“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision

We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as adults, we struggle to understand...
Share on Facebook Share on LinkedIn Share on X
cybercognitivismo fabrizio saviano intervista

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent years, ransomware attacks have pushed Italy to third place among...
Share on Facebook Share on LinkedIn Share on X
healthcare ransomware attacks Europe Italy

Why Europe’s healthcare sector must build resilience to fight the threat of ransomware

Author: Andrea Nicelli, Head of Italy and Spain at Resilience Italy’s critical infrastructure is highly exposed to cyber threats, ranking fourth in the world and first in Europe for number...
Share on Facebook Share on LinkedIn Share on X
hacktivismo

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System

The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 - a multi-layered Distributed Denial-of-Service (DDoS) using a botnet -...
Share on Facebook Share on LinkedIn Share on X
The Fall of the Human Conscience

The Fall of the Human Conscience: Programming Desensitization

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology - Ashleigh Crause tells us - is, by far, one of the most amazing inventions to date”....
Share on Facebook Share on LinkedIn Share on X
Luca Cadonici Mobile Forenics intervista

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime

Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that "is no longer limited to reactive post-incident analysis but has evolved towards a...
Share on Facebook Share on LinkedIn Share on X
elezioni USA psy ops

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes

On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435...
Share on Facebook Share on LinkedIn Share on X

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network

#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the...
Share on Facebook Share on LinkedIn Share on X
Ghost Exodus documentario storia hacker

Ghost Exodus: the story of a hacker in a documentary that has a lot to teach

Ghost Exodus through the exclusive documentary “How Hacking Ruined My Life: Ghost Exodus Story” produced by Silva Rindzevi and visible on the CyberNews Youtube channel, broke the silence to tell...
Share on Facebook Share on LinkedIn Share on X