Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
Fortinet 970x120px

Category: Culture

Whoever took down Cloudflare during the outage put their infrastructure at risk

A major outage in Cloudflare’s infrastructure has unexpectedly tested the robustness of the cloud and its security systems for many businesses. On November 18, service outages caused websites around the world to go down multiple times, and some customers attempted to temporarily abandon the platform to maintain resource availability. This forced maneuver also caused web applications to lose traditional malicious traffic filtering, which Cloudflare typically blocks at the edge of the network, for several hours. The problems began around 6:30 AM EST (11:30 UTC), when a notification about internal service degradation appeared on the status page. Over the next few hours, resources

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy, and the United States, countries with profoundly different cultures from Japan. We are therefore talking about a social and global phenomenon destined to grow. The first cases in Italy were diagnosed in 2007, and then spread and were increasingly identified as such. In 2013, the Italian Society of Psychiatry identified approximately 3 million cases between the ages of 15 and 40. An estimate for 2018 puts 100,000 cases of hikikomori in Italy

The History of GPS: The History of Satellite Navigation

It’s amazing how far we’ve come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things to have ever come out of modern technology, and it’s now built into every mobile phone and standard equipment on almost every car. The car navigator However, in the early days of automobiles, getting from point A to point B proved a bit tricky. Roads were in their infancy, highways were decades removed from what they are today, and they had primitive road signs where anyone could get lost. It didn’t take cartographers long to see the

16 Years of Go: An Innovative and Scalable Programming Language

In November 2025, the Go programming language turned 16 years old. It was released publicly on November 10, 2009 , as a Google experiment to create a simple and fast language for large distributed systems. Today, it is a key tool for modern server-side development. The current stable release is Go version 1.25.4, with regular security patches and improvements to the runtime and standard library. The idea for Go originated within Google with Robert Griesemer, Rob Pike, and Ken Thompson. They wanted a language that would compile nearly as fast as C, but also be similar in usability to Python and scalable

Quishing: What it is, how it works, and how to protect yourself

Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term ” quishing ” is a portmanteau of “QR code” and “phishing,” underscoring the deceptive nature of this practice. Attackers exploit users’ trust in QR codes, often used to quickly access links, download documents, or make payments. However, behind a seemingly innocuous QR code can be a scam designed to steal sensitive data . This data could include login credentials, financial information, or even install malware on the user’s device. This threat is particularly insidious because QR codes,

The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor

Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expert, public speaker, and writer. He is a globally recognized icon of hacking (both black and white), as well as the author of two exceptional books: “The Art of Deception” (2003) and “The Art of Intrusion” (2005). He was arrested for hacking into the computer network of Digital Equipment Corporation (DEC) and while on parole, he hacked into Pacific Bell’s voicemail system. A new arrest warrant was issued against him and he spent the next 3 years as

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We’re not just talking about scams or identity theft, but a whole range of illicit activities that can be exploited in a wide variety of ways. This applies to both data exposed online and data found on dark web marketplaces, with the common goal of making direct or indirect profits. Having learned that the undesirable use of our personal data exists and is indeed a significant market for cybercriminals, we might now conclude that all privacy regulations are completely

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In response to this need, penetration testing methods have evolved to go beyond the traditional technology-based approach, introducing Adversary Emulation. This new methodology focuses on the human aspect of vulnerabilities and the importance of a holistic approach to corporate security. What is Adversary Emulation? Adversary Emulation is an advanced penetration testing methodology that simulates attacks from a real adversary. Unlike traditional penetration testing, which focuses primarily on technical vulnerabilities, Adversary Emulation takes into

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of insurance that protects your business from financial losses caused by cyber attacks, data breaches, and other technology-related incidents. In this article, we’ll explore cyber insurance in detail and help you understand how it can help protect your online business. What are cyber insurance policies? Cyber insurance is a form of insurance that provides coverage for financial losses that may arise from cyber attacks, data breaches, and other technology-related incidents. This type of

Let’s find out what Business Impact Analysis (BIA) is

Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their operations, the risks associated with those activities, and the impacts of their unavailability. The ultimate goal of the BIA is to develop business continuity strategies and measures to minimize the negative impacts of any business interruptions. In this article, we’ll explore what Business Impact Analysis is and how it can be used to ensure business continuity within a large organization. Definition of BIA Business Impact Analysis (BIA) is an analytical process that identifies critical business activities, the risks associated with those activities,