Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
970x20 Itcentric

Category: Culture

What is risk analysis in ICT Risk Management?

Risk analysis is an important process in the context of ICT Risk Management as it allows us to evaluate the effectiveness of the technical countermeasures adopted to mitigate ICT risks. This process involves assessing the security of information systems and technological infrastructure, as well as the information security management processes adopted by the organization. In this article, we’ll explore what risk analysis means and how this process helps organizations reduce cyber risk and increase resilience. Asset Identification In IT risk management, asset identification is a key step in the risk assessment process. In this step, the company’s IT assets are identified and

What is Web Scraping? Let’s Understand It Better

We have often talked about huge user databases being sold on underground forums and said that this was web scraping. In April 2021, Facebook lost 533 million users , while in June 2021, LinkedIn lost 700 million users , practically its entire user base which in fact currently amounts to 756 million users. LinkedIn immediately clarified: “Our teams have been investigating a series of alleged LinkedIn data leaks that were made available for sale. We want to be clear that this is not a data breach and that no private LinkedIn member data was exposed.” But then, if everything is in order

Exploring Cyberspace: States and Wars Without Geographic Borders

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between the beauty of always being connected and the threats that constantly impact it, I’d like to tell you a story, one that is as simple as possible but useful in helping you understand the importance that cybersecurity has in all of our lives today. Are you ready? Let’s go. In June 2009, the US and Israeli governments, as part of the “2006 Olympic Games” operation promoted by Bush, created a computer virus

The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah

A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled ” UNIX Original From Bell Labs V4 (See Manual for format) ” was discovered at the University of Utah: likely an original copy of UNIX Fourth Edition, created at Bell Labs around 1973. Professor Robert Ricci of the Kahlert School of Computing announced it in a post on Mastodon . He said the tape was found by employees cleaning out a warehouse. The professor recognized the handwriting on the label as that of his supervisor, Jay Lepreau

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25, the International Day for the Elimination of Violence against Women. The focus here is on the non-consensual dissemination of intimate images and its legal and social implications. The non-consensual sharing of intimate images, known as revenge porn , is one of the most insidious and pervasive manifestations of Online Gender-Based Violence (OGV). In legal and criminological debate, the more neutral term Non-Consensual Sharing of Intimate Images (NCII) is preferred to fully recognize it as an act of oppression and a predominantly

Epic vs. Google: Historic Agreement for App Developers

Just when it seemed like Epic’s case against Google was on the verge of a final victory for the developer —following the potential dismissal of Google’s appeal by the Supreme Court— the parties unexpectedly announced a settlement on Tuesday evening. If Judge James Donato approves the proposed changes, Epic’s victory could become a long-term global success. Judge Donato had previously granted Epic’s main claims. He issued a permanent injunction requiring Google to host competing app stores on its Google Play Store and provide them with access to its full app catalog. Google was also barred from requiring developers to use Google Play

AI Alignment: Where Does AI Learn Right and Wrong?

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom conversations with buzzwords and Skynet -like panic: it was a real exchange, with legitimate doubts. And indeed, in Italy, between sensationalist headlines and articles written by those who confuse ChatGPT with HAL 9000, it’s no wonder confusion reigns. The point that had struck my interlocutor was that of alignment. “But where does an AI learn what is right and what is wrong?” A simple question, but one that opens up

Cyberwar in Italy: The government brings the army into cyberspace.

Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by Artificial Intelligence and widespread digitalization has transformed critical infrastructure, healthcare services, universities, and personal communications into permanent attack surfaces. In this scenario, the line between cybercrime, political activism, and state-sponsored threats has progressively blurred, giving rise to new forms of hybrid conflict. In Italy, this transformation is reflected in the debate on the bill presented by Defense Committee Chairman Nino Minardo, which grants the Armed Forces an operational role beyond traditional warfare.

Samsung under attack in Italy: phones held hostage by ransomware

For a few days now, news has been circulating, which I don’t think has been confirmed by official sources, of a ransomware attack carried out through Samsung’s “corporate fleet” management function ( E-FOTA ). According to a post by a user on the FibraClick forum , published a few days ago, this attack is also spreading in Italy. Essentially, cybercriminals trick users browsing the web on their Samsung smartphone into opening a specially crafted link like this: intent://signin.samsung.com/key/yphxkjlx?modelName=SAMSUNG#intent;scheme=https;package=com.osp.app.signin;end. which opens a pop-up on the victim’s smartphone requesting access through their Samsung account. If the victim approves the login, the smartphone becomes part

Discipline your email first so you don’t regret it later

Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and security . Despite being a work tool, an individual email inbox (and therefore, assigned to a single operator) is considered the employee’s digital home and, therefore, requires reasonable protection to safeguard the rights, fundamental freedoms, and dignity of the data subjects involved in the exchange of communications (both the account holder and third parties). This complexity, recognized not only by case law but also by supervisory authorities with regard to applicable data protection legislation, therefore requires particular attention in coordinating