Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
2nd Edition GlitchZone RHC 970x120 2

Author: Olivia Terragni

cybercognitivismo fabrizio saviano intervista

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet – due to the Russia-Ukraine conflict – has increased significantly. In recent years, ransomware attacks have pushed Italy to third place among the countries most attacked by cybercriminals, but it is also true that threats vary over time and often in completely unexpected ways. For this reason, we must learn to protect our organization and our systems.  As we have seen, a series of DDoS (Distributed Denial of Service) attacks on the Ukrainian government – starting on February 15 – have continued over time, also hitting banking institutions. On February 23, the new malware

healthcare ransomware attacks Europe Italy

Why Europe’s healthcare sector must build resilience to fight the threat of ransomware

Author: Andrea Nicelli, Head of Italy and Spain at Resilience Italy’s critical infrastructure is highly exposed to cyber threats, ranking fourth in the world and first in Europe for number of cyber-attacks faced in 2024. Despite being a critical hub for digital innovation, companies in the country face significant threats from cybercrime, particularly in healthcare, government and universities. These sectors lack basic IT security infrastructure, and the adoption of cyber insurance is minimal. Ransomware is one of the primary threats for Italian organisations, with institutions including the University of Siena, Bologna FC, and SynLab Italia breached last year. Ransomware remained the leading

hacktivismo

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System

The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 – a multi-layered Distributed Denial-of-Service (DDoS) using a botnet – claimed by by the pro-Palestinian hacktivist group Dark Storm, caused a major global outage, affecting a large number of users worldwide and disrupting its services. “There’s been (still is) a massive cyberattack against X,” Musk wrote, “We are attacked every day, but this one was done with many resources. Seems to be a large, coordinated group and/or a country involved”. X had previously (in August 2024) already suffered a DDoS attack, which

The Fall of the Human Conscience

The Fall of the Human Conscience: Programming Desensitization

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology – Ashleigh Crause tells us – is, by far, one of the most amazing inventions to date”. Although all this comes at a price, naturally. I would like to quote, before you read what Ashleigh writes, the words of Mike Featherstone: “individuals in California don’t even meet on the sidewalk anymore, but when they do it they look at everything through a square screen”. Yes, it must be like this I think, through that interface we are able to transform the concept of biological organism and physical reality into

Luca Cadonici Mobile Forenics intervista

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime

Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that “is no longer limited to reactive post-incident analysis but has evolved towards a proactive approach, aimed at prevention and threat intelligence”. Specifically, Mobile Forensics, commonly used to recover evidence in connection with a criminal investigation, today is applied to any type of crime, thanks also to the fact that digital technologies play an increasingly important role in our lives.  Mobile Forensics investigations range from traditional crimes “in which the IT aspect is a continuation of the crime itself” to “fraud, cyberstalking, sextortion, but also murder,

elezioni USA psy ops

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes

On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435 Members of the U.S. House of Representatives will be chosen. In this context, influence operations through digital echo chambers – such as digital platforms and social media – can play a critical role, shaping narratives that can influence people’s opinions, who are exposed to different types of political, scientific, cultural, conspiracy or extremist content. We already put the spotlight on a 2024 marked by provocations in the great march to the polls

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network

#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the discovery of a huge network of CSAM (Child Sexual Abuse Material) from which emerged a thousand-headed monster, Hydra and those who did it are the Electronik Tribulation Army (ETA) and the W1nterSt0rm conglomerate an OSINT and threat intelligence group committed to educating and then combating online sexual predators targeting children. The #OpChildSafety (Operation Child Safety) campaign has a long history on the Internet: many of you will remember the #OpPedoHunt operation, created

Ghost Exodus documentario storia hacker

Ghost Exodus: the story of a hacker in a documentary that has a lot to teach

Ghost Exodus through the exclusive documentary “How Hacking Ruined My Life: Ghost Exodus Story” produced by Silva Rindzevi and visible on the CyberNews Youtube channel, broke the silence to tell us the long road traveled and the consequences of what changed his life life forever, in a way that “you can’t just go back and fix everything.” He would like to do it. His story is also a warning: “prison is not made for hackers, we are not like other people”, above all we have much more to give than sitting in front of a computer screen for all our life. “If

Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations

Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials save lives, prevent further crimes from being committed by perpetrators, and also provide a detailed information platform that can stitch together obscure tidbits of data that can help them hunt down and capture fugitives and individuals fleeing from an arrest warrant. Access to these public record systems is set to help legal professionals solve cases faster by reducing the number of people it would ordinarily take to resolve the cases, as well as the time and expenses associated with lengthy investigations. It’s not uncommon to

Electronic warfare (EW) between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of the next president of South Korea. To begin the command of the Armed Forces of the Republic of Korea (CFC) and the United States will have to devise a strategy to deter cyber attacks. The first part of this article can be found here: North Korea’s cyber warfare and its cyber army (part one) What are the targets? North Korea is capable of deploying advanced technologies, and the main objectives are critical