Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
UtiliaCS 970x120

Category: Culture

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

With the increase in ransomware attacks—often launched via phishing emails—it’s crucial to be proactive in protecting yourself and the organization you work for. Certainly, having computers and servers that are up-to-date with system and security patches, antivirus software, and other endpoint tools helps greatly in reducing the risk of infection, but being prepared to recognize phishing emails and educating your organization’s employees to be proactive is crucial. What is Phishing? To understand how a malicious actor who threatens us with phishing emails thinks, you can watch Veronica Patron’s interesting video for Red Hot Cyber on Psychology and Social Engineering: For a general

There’s no such thing as zero risk! There’s only one risk you need to know to manage.

Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information management become increasingly digital, the risk of cyberattacks has become increasingly high. In this article, we’ll explore the concept of zero risk and why, despite efforts to reduce risk, achieving a complete, risk-free level of security is impossible. We’ll also explore the concepts of risk appetite and risk tolerance, explaining why it’s important to understand risk and adopt strategies to manage it, rather than trying to eliminate it completely. Finally, we’ll discuss the Black Swan concept and how unpredictable events can compromise

Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks

Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effective tools for encrypting traffic and preventing data interception, they are not able to protect us from all risks. In the article below, we explain in detail how a VPN (Virtual Private Network) works. The article discusses VPN in depth, analyzing how it works and what specific advantages it offers. The different types of VPNs are described, the criteria for choosing the best solution, and best practices for implementing them safely. While confirming what is reported in the article, namely

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain

This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding human relational dynamics can offer us valuable tools to defend ourselves in the complex digital landscape. Forget the image of the hacker who breaks down doors. The cyber threat landscape of 2025 is dominated by a much more insidious strategy, borrowed directly from the darkest dynamics of human psychology: breadcrumbing. Think of it as a skilled fisherman’s technique: he doesn’t cast a huge net, but casts small, tempting baits—breadcrumbs—to keep fish within

Urobot watches you while you pee (but it’s for your own good)

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a “cute” style, social media users have noted that it looks scary and causes discomfort to patients. The photo shows Urobot installed next to regular urinals in a men’s bathroom. The device is shaped like an anthropomorphic robot, with a logo screen on its body and a urinal built into its bottom. But Taiwan isn’t the only example of bold robotics in medicine. While Urobot monitors tests, other clinics are already using Nurabot, a robotic assistant created by Foxconn and Kawasaki.

healthcare ransomware attacks Europe Italy

Why Europe’s healthcare sector must build resilience to fight the threat of ransomware

Author: Andrea Nicelli, Head of Italy and Spain at Resilience Italy’s critical infrastructure is highly exposed to cyber threats, ranking fourth in the world and first in Europe for number of cyber-attacks faced in 2024. Despite being a critical hub for digital innovation, companies in the country face significant threats from cybercrime, particularly in healthcare, government and universities. These sectors lack basic IT security infrastructure, and the adoption of cyber insurance is minimal. Ransomware is one of the primary threats for Italian organisations, with institutions including the University of Siena, Bologna FC, and SynLab Italia breached last year. Ransomware remained the leading

The Fall of the Human Conscience

The Fall of the Human Conscience: Programming Desensitization

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology – Ashleigh Crause tells us – is, by far, one of the most amazing inventions to date”. Although all this comes at a price, naturally. I would like to quote, before you read what Ashleigh writes, the words of Mike Featherstone: “individuals in California don’t even meet on the sidewalk anymore, but when they do it they look at everything through a square screen”. Yes, it must be like this I think, through that interface we are able to transform the concept of biological organism and physical reality into

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI

Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it’s important to recognize that this revolutionary technology has a rich history spanning over seventy years of continuous development. To fully appreciate the capabilities and potential of modern AI tools, it is necessary to trace the evolution of this field from its origins to its current state. This historical context not only deepens our understanding of current advancements but also allows us to predict future directions in AI development more accurately. Alan Turing: COMPUTING MACHINERY AND INTELLIGENCE The history of artificial intelligence begins with a publication by Alan

Mathematics Meets Programming: A transformation journey

Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, Senior Programmer and Penetration Tester  This article was written with the valuable collaboration of Stefano Versace, my former high school mathematics teacher and currently a teacher at the Scientific High School. I thank him very much for participating in the drafting of the article, and also as a teacher. Giovanni Pollola, a Mechanical Engineering student at the “Luigi Vanvitelli” University, contributed to the writing, whom I thank with all my heart. Furthermore, it was reviewed by Sergio Corpettini, Advanced Project Engineer,

The Deception of the Wallet: A Journey into the World of Scammers

Giorgio sat in the self-help circle, the dim candlelight dancing on the walls. The eyes of the other participants were fixed on him, waiting for him to speak. It was time to share his story, to unburden himself from the weight he had carried for too long. “My name is Giorgio,” he began, his voice trembling. “And I was scammed.” The faces around him leaned in. Giorgio recounted that summer day in Bristol when he found a wallet on the ground in a public park. Inside was a slip of paper with a web address, a username, and a password. Curiosity led