Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Cyber Offensive Fundamentals 970x120 V0.1

Category: Culture

Explore how culture shapes technology, innovation and cybersecurity, influencing digital awareness, hacker mindset and the evolution of the cyber world. In-depth insights on cyber culture, digital ethics, social impact of technology and security awareness. Understanding culture as a key element in building knowledge, resilience and defense in the modern digital landscape.

Numero di articoli trovati: 28

EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights

Before delving into the analysis, it is worth pointing out that this contribution is the first part of a more extensive research. In the next article, we will explore the...

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We're not just talking about scams or...

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In...

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25, the International Day for the Elimination of Violence against...

AI Alignment: Where Does AI Learn Right and Wrong?

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn't one of...

Cyberwar in Italy: The government brings the army into cyberspace.

Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by...

Samsung under attack in Italy: phones held hostage by ransomware

For a few days now, news has been circulating, which I don't think has been confirmed by official sources, of a ransomware attack carried out through Samsung's "corporate fleet" management...

Discipline your email first so you don’t regret it later

Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and security . Despite being a work tool, an...

Mathematical Security: From Number Theory to Hacking and Pentesting

When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there's a deeper level, unseen and unsurpassed: the laws of mathematics. Because while software can...