Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
LECS 970x120 1

Author: Sandro Sana

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In response to this need, penetration testing methods have evolved to go beyond the traditional technology-based approach, introducing Adversary Emulation. This new methodology focuses on the human aspect of vulnerabilities and the importance of a holistic approach to corporate security. What is Adversary Emulation? Adversary Emulation is an advanced penetration testing methodology that simulates attacks from a real adversary. Unlike traditional penetration testing, which focuses primarily on technical vulnerabilities, Adversary Emulation takes into

They told you 6G would be fast, right? But they didn’t tell you the whole truth

It’s not “ just faster ”: 6G changes the very nature of the network! When we talk about 6G, we risk reducing everything to a speed upgrade, as if the network of the future were simply a 5G with more horsepower. In reality, the leap isn’t about bandwidth, but about how the network will perceive the world. For the first time, a mobile network will not simply transmit and receive signals, but will also observe its environment to operate correctly. MSCP: The paradigm-changing fusion of visual and radio sensors The IEEE study introduces the MSCP technique, a hybrid approach that fuses RF

Mossad, the rigged supply chain, and intimidated judges

Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage and surveillance network over time by inserting tampered hardware into commercial devices used by its adversaries. We’re talking about radios, pagers, and “normal” communications equipment that can actually locate, listen, or explode. This infrastructure, he says, has been deployed “in every country you can imagine.” He said this in a recent interview, which was reported by outlets like Middle East Monitor and Israeli media , citing the podcast “The Brink.” Second, Cohen

Electricians and plumbers: They are the real winners of the AI boom

Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the short to medium term, will be electricians, plumbers, and skilled craftsmen in general. Yes, those very same workers: the “blue-collar” workers who transform the megawatts and megadata of new data centers into reality. A vision that clashes (and at the same time fits) with the other side of the coin: the growing fear of a speculative bubble in AI, which risks yet another “technological collapse” if the numbers don’t hold up to the impact of reality. Huang’s Paradox: AI Is Software, But

Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).

Every time Brussels churns out a new acronym, someone in the company snorts: “More paper?” It happens. But the Data Act isn’t just a stamp to add to the binder: it clarifies who can access data, under what conditions, and how to exit a cloud provider without being locked in. In a market dominated by connected products, platforms, and “take it or leave it” contracts, it’s a tangible step change. The Regulation entered into force on January 11, 2024 , and will apply throughout the EU from September 12, 2025. The goal is to create a fairer and more competitive data market:

Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy

The news is simple, the technology is not. Chat Control (CSAR) was created to uncover CSAM and grooming dynamics within messaging platforms. The “modernized” version forgoes the server-side backdoor and shifts the focus to the user’s device: client-side scanning before the content is end-to-end encrypted. This is where the two levels of the story come into play: on the one hand, investigative capacity and dismantling illegal channels; on the other, erosion of confidentiality and a control infrastructure ready to be expanded. Wired Italia has listed the hot spots, we’re going under the hood. How it really works: client-side detection pipeline The typical

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter, signed by James Comer and Nancy Mace, places the platform under investigation and demands the release of documents, communications, and, even more sensitively, the identification data of volunteer editors who have written articles deemed “anti-Israel.” A request that shakes the pillars not only of Wikipedia, but of the entire digital ecosystem: user privacy and freedom of expression. The American Paradox The United States likes to call itself “the home of free speech,”

Stagershell: When malware leaves no trace. Malware Forge analysis.

In early 2025, an Italian organization found itself the victim of a sneaky intrusion. No dramatic exploit, no textbook attack. What opened the door to the attackers was a VPN account left active after a former employee’s departure. A simple oversight allowed the attackers to infiltrate the network with seemingly no effort. From then on, the rest was a game of patience: silent movement, privilege escalation, and months of hidden presence within the infrastructure. Download the STAGERSHELL report created by Malware Forge The discovery of StagerShell During incident response operations, a Blue Team identified two suspicious artifacts. These weren’t the usual executable

What are Rootkits? Discovering one of the most insidious threats

Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term “rootkit” comes from the combination of two words: “root,” which in Unix and Linux systems refers to the user with the highest privileges, and “kit,” which indicates a set of software tools. A rootkit, therefore, is a set of tools designed to grant privileged access to a computer system while remaining hidden from the user and security software. How Do Rootkits Work? Rootkits work by infiltrating the operating system or other core software components, masking their presence and allowing an attacker to maintain control

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for use as evidence in a legal context. This field has become increasingly relevant with the spread of digital technologies in almost every aspect of daily life and the rise of cybercrimes, such as fraud, hacker attacks, and privacy violations. Definition and Objectives of Digital Forensics Digital forensics can be defined as a set of techniques and tools used to identify, preserve, analyze, and document digital information for investigative and legal purposes. The primary goal is to obtain digital evidence that is