In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, rewards in cryptocurrencies.A...
In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in understanding and generating natural language. However, behind the scenes,...
In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted from a list of over...
The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...
In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of patients...
We often talk about ransomware on Red Hot Cyber and criminal cyber gangs. But who invented this dangerous cyber blackmail "weapon"? Today, ransomware attacks have become familiar to most people,...
Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...
Hunters International, the group responsible for one of the largest ransomware attacks in recent years, has officially announced the cessation of its operations. In a statement published on its darknet...
The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team of lawyers, so that they could put pressure on the...
Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow one another, one fact emerges glaringly: AKIRA has entered the...