Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Banner Ancharia Desktop 1 1

Category: Cyberpolitics

Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay

From November 12, 2025, AGCOM reported that in line with art. 13-bis of the Caivano decree (dl123/2023) , 47 adult websites accessible from Italy would have to introduce an identity verification system to prevent access by minors. Age Verification on Adult Websites Begins November 12 in Italy This measure, anticipated for months, was heralded as a decisive step toward protecting young people online. However, one day after the deadline, the main adult portals are still freely accessible, without any additional verification. Visiting Pornhub, the world’s largest adult content hub, today, the site looks exactly the same: a home screen where the user

Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack.

We’re talking about 11 billion euros. A staggering figure! China’s National Computer Virus Emergency Response Center (CVERC) said that a state-run entity, likely U.S. , was behind a 2020 attack on a Bitcoin mining company . Recently, the CVERC published a report on Weixin describing an attack on the operator of the LuBian mining pool, which operated in China and Iran. Following the incident, unknown attackers stole 127,272 bitcoins. According to the center, the owner of the stolen funds was Chen Zhi, chairman of the Cambodian Prince Group. In early 2021 and in July 2022, he left messages on the blockchain demanding

Vault7 with a Chinese twist: China’s secret global surveillance system exposed

Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA’s arsenal: toolkits for penetrating smartphones, smart TVs, and operating systems, command and control infrastructure, and frameworks for obfuscating code. Tools like Weeping Angel (which turned TVs into microphones), HIVE (C2 for hundreds of implants), and the Marble Framework (for masking and falsely attributing malware) demonstrated that offensive intelligence was common practice even for Western powers. Today, with the Knownsec leak, the same scenario is being repeated under a different banner: rather than judging who is “worse,” it’s confirmation that

The tale of the Mayor who thought of banning axes… but then came the Saws

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly sacrificed a few small comforts to keep it safe and didn’t complain too much. And those who didn’t want to give up were kindly asked to leave. First by the neighbors, then by the authorities. This way, everyone could always count on the fact that the majority not only cared about the Magical Forest, but would always do their utmost to defend it. At all costs. However, some criminals decided to hoard

Cybersecurity is democratic: the same virus hits multinationals and housewives

The same malware that yesterday blocked the servers of a major bank today encrypts Mrs. Pina’s photos on her home PC. As? With an innocuous WhatsApp message, sent by his nephew, whose wife works at that very bank, who contracted the same virus on his company PC, which spread automatically. This story is not a fairy tale, but the stark reality that demonstrates an uncomfortable truth: cybersecurity is profoundly democratic. Threats make no distinctions, they target multinationals and small businesses, large corporations and individuals, exploiting the weakest link in the chain: the human factor. Organizations are not abstract containers, but networks of

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?

Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided for by Resolution 96/25/CONS, implements the provisions of the so-called “Caivano decree,” approved in 2023 by Giorgia Meloni’s government to combat juvenile crime and protect minors from accessing prohibited content. What changes from November 12th Until now, to enter an adult site , you simply had to declare that you were at least 18 years old with a simple click on the home screen . This easily circumvented method allowed even minors

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international sanctions and support its nuclear and missile programs. A recent report, covering the years from January 2024 to September 2025, highlights this strategy. The report’s authors highlight that virtually all illegal activities are orchestrated by organizations that have already been subjected to punitive measures. Through shell companies and anonymous IT groups, these entities operate with the primary goal of financially supporting prohibited weapons programs. According to the authors of the paper, North

A joke extension and Chat Control crashes! Houston, we have a problem… with privacy

In 2025, the European Union wants full control over private chats. The “Chat Control” regulation (proposal COM(2022)209) claims to fight child pornography by scanning private messages on WhatsApp, Telegram, Gmail, and the like. Noble intention in theory. In practice, it means every single message you type online could be read and analyzed by automated systems, with very real and immediate consequences for everyone’s privacy. And since no system is unbreakable, it doesn’t take a genius to do the math on the risks. For the average user, the fallout is simple but serious: Meanwhile, the people who actually want to hide aren’t shy

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common in the war sector, with Europe attempting to shift some of its member states’ resources, and the United States increasingly adopting a highly protectionist economic stance, using tariffs as a means of reducing trade deficits with key countries, including China. INTRO – The Silence of the Dragons The recent decisions taken by POTUS Donald Trump regarding the Chinese economic entity are nothing more than the continuation of decisions taken in the first

US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack

The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and Israel that began on June 13, 2025. The US Department of Homeland Security (DHS) said that the current situation creates a “elevated threat” in the country’s cyberspace. The department said that hacktivists, as well as groups associated with Iranian government agencies, will most likely focus their attacks on American networks and vulnerable devices connected to the Internet. According to the DHS, such activities have already been recorded: these are low-level attacks aimed at creating