Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Category: Cyberpolitics

Nuclear rearmament, cyber guerrillas and cyber crime.

Author: Roberto Villani Tanslate: Vincenzo Marcovecchio Pubblication date: 19/12/2021 Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s that we have left for more than 20 years has left us the logic of the opposition between states. If at the time the conflict was between east and west, today it is much more extensive and sees the participating actors always in opposition, no longer ideological but strategic. We have always said that natural resources are the main element of conquest, first of all water that guarantees life

Why privacy does not exist.

Author Massimiliano Brolli Translation: Vincenzo Marcovecchio Pubblication date: 18/12/2021 Privacy, privacy, privacy, … privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work, we talk about it at school, we talk about it at the bar because it is a concept that in a democratic world should be a right, but in fact, in the era of digital, social, mobile phones as a “prosthesis” of our body, it could be a utopia today. But I don’t want to jump to any would not like to draw

Electronic warfare (EW) between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of the next president of South Korea. To begin the command of the Armed Forces of the Republic of Korea (CFC) and the United States will have to devise a strategy to deter cyber attacks. The first part of this article can be found here: North Korea’s cyber warfare and its cyber army (part one) What are the targets? North Korea is capable of deploying advanced technologies, and the main objectives are critical

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so little to comprehend what’s happening there. Maybe it is hard for many to believe that a hacking army – capable of compromising computer networks around the world – is hiding in Pyongyang, when only a small fraction (1%) of North Koreans have access to the Internet. Yet here, hackers are identified and trained as the former Soviet Block – NewYorker underlined – did with olympionics. Except that the key

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems, such as RDP. The initial intrusions usually take place via existing vulnerabilities or stolen legitimate credentials. C25 Intelligence finally reports from where Dharma variants have been operated during 2020 and how to defend against this threat. What is dharma/crysis ransomware Dharma, a family of ransomware first spotted in 2016, is a malicious program that encrypts a victim’s files and takes as hostage the data on demand for the ransom payment to restore