Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x120 Olympous

Author: Luca Galuppi

Luca Galuppi

A lifelong technology enthusiast. I have been working in the IT field for over 15 years. I have particular experience in Firewall and Networking and deal with Network Design and IT Architectures on a daily basis. I currently serve as Senior IT Engineer and PM for an IT Consulting and Services company.

Profilo LinkedIn
Areas of Expertise Firewalls, Networking, Network Design, IT Architectures, IT Services
Numero di articoli trovati: 9

Google Discontinues Dark Web Report, Shifts to Active Protection

No more useless alerts. No more passive monitoring. Less than two years after its launch, Google has decided to shut down one of the most talked-about digital security tools: the...

Domestic robots and privacy: the hidden price of the automated future

The home of the future is full of robots. Automated laundries, personal assistants, and small electronic housekeepers are all devices designed to free up precious time and make domestic life...

AzureHound: The “Legitimate” Tool for Cloud Attacks

AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID...

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft...

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge

While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet Explorer Mode (IE Mode) in Edge , which was designed...

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectual property and the industrial secrets that...

Storm-0501: When Ransomware Moves to the Cloud

Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more "traditional" attacks on on-premise machines, no more ransomware that encrypts local files. Now the threat is moving...

Patch Chaos: Windows 11 Update Breaks PDF Printing

Yes, once again a Windows update has unleashed hell. The harmless “Microsoft Print to PDF” function, a silent ally of users and IT administrators for years, has ended up KO...

IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!

Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging to the company's employees. The leak, dated October 2024, allegedly resulted in the compromise...