Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
970x120

Category: Culture

Epic vs. Google: Historic Agreement for App Developers

Just when it seemed like Epic’s case against Google was on the verge of a final victory for the developer —following the potential dismissal of Google’s appeal by the Supreme Court— the parties unexpectedly announced a settlement on Tuesday evening. If Judge James Donato approves the proposed changes, Epic’s victory could become a long-term global success. Judge Donato had previously granted Epic’s main claims. He issued a permanent injunction requiring Google to host competing app stores on its Google Play Store and provide them with access to its full app catalog. Google was also barred from requiring developers to use Google Play

AI Alignment: Where Does AI Learn Right and Wrong?

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom conversations with buzzwords and Skynet -like panic: it was a real exchange, with legitimate doubts. And indeed, in Italy, between sensationalist headlines and articles written by those who confuse ChatGPT with HAL 9000, it’s no wonder confusion reigns. The point that had struck my interlocutor was that of alignment. “But where does an AI learn what is right and what is wrong?” A simple question, but one that opens up

Cyberwar in Italy: The government brings the army into cyberspace.

Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by Artificial Intelligence and widespread digitalization has transformed critical infrastructure, healthcare services, universities, and personal communications into permanent attack surfaces. In this scenario, the line between cybercrime, political activism, and state-sponsored threats has progressively blurred, giving rise to new forms of hybrid conflict. In Italy, this transformation is reflected in the debate on the bill presented by Defense Committee Chairman Nino Minardo, which grants the Armed Forces an operational role beyond traditional warfare.

Samsung under attack in Italy: phones held hostage by ransomware

For a few days now, news has been circulating, which I don’t think has been confirmed by official sources, of a ransomware attack carried out through Samsung’s “corporate fleet” management function ( E-FOTA ). According to a post by a user on the FibraClick forum , published a few days ago, this attack is also spreading in Italy. Essentially, cybercriminals trick users browsing the web on their Samsung smartphone into opening a specially crafted link like this: intent://signin.samsung.com/key/yphxkjlx?modelName=SAMSUNG#intent;scheme=https;package=com.osp.app.signin;end. which opens a pop-up on the victim’s smartphone requesting access through their Samsung account. If the victim approves the login, the smartphone becomes part

Discipline your email first so you don’t regret it later

Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and security . Despite being a work tool, an individual email inbox (and therefore, assigned to a single operator) is considered the employee’s digital home and, therefore, requires reasonable protection to safeguard the rights, fundamental freedoms, and dignity of the data subjects involved in the exchange of communications (both the account holder and third parties). This complexity, recognized not only by case law but also by supervisory authorities with regard to applicable data protection legislation, therefore requires particular attention in coordinating

Mathematical Security: From Number Theory to Hacking and Pentesting

When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there’s a deeper level, unseen and unsurpassed: the laws of mathematics. Because while software can be hacked, protocols can be bypassed, configurations can be messed up, mathematics cannot be corrupted. And it is precisely on this pillar that modern cybersecurity is based. Because safety is (also) mathematics Every digital defense technology works not because “someone programmed it well,” but because it exploits mathematical problems that have no efficient solution. Here are some concrete examples: RSA: It is based on the difficulty of factoring numbers of hundreds of

Regulating out-of-office work: a best practice for organizations and beyond.

When talking about information security, we must first take a breath and realize that we need to dive deeper than just computer systems and directly expressed information. It concerns all information and all information systems. So we must definitely take a deep breath, because otherwise it’s natural to find ourselves feeling a little dizzy, leading us to ignore what is communicated verbally, everything that can be deduced, for example. And if we’re short of oxygen, those who are planning an attack against us—or rather, against a cluster in which we, unfortunately, are included, because we could rarely be special snowflakes for a

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What happens when we sign up for a social network or when we request a banking transaction? Even without realizing it, every day we leave personal data everywhere—traces that reveal who we are and our preferences. In our legal system, however, the word privacy does not have a generally accepted definition; in fact, it indicates a changing concept linked to the evolution of the legal and social context. Very often, the term privacy is

The Sexualisation of AI: A Warning for Humanity

Is AI replacing intimacy? Artificial Intelligence is one of the most powerful technological shifts in human history. It can simulate thought, learn from data, and perform intellectual feats in seconds that would take humans years. At its best, AI can enhance human understanding, create new solutions to old problems, and expand the limits of our knowledge. Yet, instead of fully embracing this potential, a troubling trend has emerged: the sexualisation of AI. From “anime companions” in Grok to explicit roleplay chatbots, we are normalising the idea that AI exists to satisfy sexual fantasies rather than advance civilisation. This is more than a

Discovering the Deep Web and Dark Web: The Ultimate Guide

There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The dark web is often associated with shady and criminal activities that are carried out or transit on the Internet. This is not always true, but to understand how to enter the dark web, we must first know it and understand its history and motivations. In this article, we will fully understand what the deep web and the dark web are and then explain how to safely access the latter. We are all