Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
LECS 970x120 1

Category: Culture

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.

In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks, targeted intrusions that can cause significant damage, both financially and to reputation. In this context, the “cyber kill chain” represents a reference model for defense against cyber threats. It is a proactive approach that analyzes the different phases of a cyber attack, providing a framework for prevention, detection, and response. Understanding the cyber kill chain is essential not only for attackers, but also for strengthening cybersecurity and protecting against increasingly sophisticated attacks. In this article, we’ll explore the different stages of the

What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.

Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious activity. CTI has become a key element of cybersecurity, helping organizations identify and mitigate threats before they cause real damage. In this article, we’ll explore Cyber Threat Intelligence in detail, explaining how it works, its main benefits, and how organizations can implement this practice to improve their cybersecurity. What is Cyber Threat Intelligence Cyber Threat Intelligence involves analyzing cyber threat data to identify attackers’ intentions and capabilities. This practice is essential for understanding risk and taking preventative measures against cyber attacks. CTI

Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon

Stop scrolling for a moment and look around you. Every meme, every viral video, every outrage-fueled hashtag, are you sure you chose them? Or did they choose you? We like to think we’re immune to manipulation, that our beliefs and behaviours are our own. But the reality is far more uncomfortable: the internet has become humanity’s largest psychological experiment, a vast, borderless Petri dish where social contagion is not just possible, but engineered, weaponized, and relentless. The End of Innocence: When Trends Became Epidemics Decades ago, rumours and fads spread slowly, like ripples in a pond. Today, the internet is an ocean

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.

Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software vulnerabilities, as they focus on aspects that seem insignificant at a superficial glance. These aspects, such as energy consumption, execution time, or electromagnetic radiation, can reveal security issues that can be exploited to access sensitive data. In this article, we will explore the world of Side Channel Attacks, highlighting their complexity and, at the same time, their danger. We will begin with an overview of the various types of Side Channel Attacks, followed

What is Doxing and How Can It Change Your Online Life?

Doxing (short for “dropping dox,” sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real name, home address, workplace, phone number, financial information, and other personal information. This information is then released to the public, without the victim’s permission. While the practice of revealing personal information without consent predates the Internet, the term Doxing first emerged in the world of cybercrime in the 1990s, where anonymity was considered sacred. Preface Feuds between rival hackers sometimes led to the “release of documents” relating to other hackers online, which previously was typically the name behind a

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

With the increase in ransomware attacks—often launched via phishing emails—it’s crucial to be proactive in protecting yourself and the organization you work for. Certainly, having computers and servers that are up-to-date with system and security patches, antivirus software, and other endpoint tools helps greatly in reducing the risk of infection, but being prepared to recognize phishing emails and educating your organization’s employees to be proactive is crucial. What is Phishing? To understand how a malicious actor who threatens us with phishing emails thinks, you can watch Veronica Patron’s interesting video for Red Hot Cyber on Psychology and Social Engineering: For a general

There’s no such thing as zero risk! There’s only one risk you need to know to manage.

Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information management become increasingly digital, the risk of cyberattacks has become increasingly high. In this article, we’ll explore the concept of zero risk and why, despite efforts to reduce risk, achieving a complete, risk-free level of security is impossible. We’ll also explore the concepts of risk appetite and risk tolerance, explaining why it’s important to understand risk and adopt strategies to manage it, rather than trying to eliminate it completely. Finally, we’ll discuss the Black Swan concept and how unpredictable events can compromise

Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks

Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effective tools for encrypting traffic and preventing data interception, they are not able to protect us from all risks. In the article below, we explain in detail how a VPN (Virtual Private Network) works. The article discusses VPN in depth, analyzing how it works and what specific advantages it offers. The different types of VPNs are described, the criteria for choosing the best solution, and best practices for implementing them safely. While confirming what is reported in the article, namely

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain

This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding human relational dynamics can offer us valuable tools to defend ourselves in the complex digital landscape. Forget the image of the hacker who breaks down doors. The cyber threat landscape of 2025 is dominated by a much more insidious strategy, borrowed directly from the darkest dynamics of human psychology: breadcrumbing. Think of it as a skilled fisherman’s technique: he doesn’t cast a huge net, but casts small, tempting baits—breadcrumbs—to keep fish within

Urobot watches you while you pee (but it’s for your own good)

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a “cute” style, social media users have noted that it looks scary and causes discomfort to patients. The photo shows Urobot installed next to regular urinals in a men’s bathroom. The device is shaped like an anthropomorphic robot, with a logo screen on its body and a urinal built into its bottom. But Taiwan isn’t the only example of bold robotics in medicine. While Urobot monitors tests, other clinics are already using Nurabot, a robotic assistant created by Foxconn and Kawasaki.