Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the technical p...

According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn’t intentionally shared their location. He claimed to have received a...

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly of Twitter) under...

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...
The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor
Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.
Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.
Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?
Protecting your WiFi by hiding the name? This is a false sense of security
Open WiFi Networks: A Fertile Ground for Cybercrime

The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor
Redazione RHC - November 11th, 2025
Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expert, public speaker, and writer. He...

Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.
Redazione RHC - November 11th, 2025
Synology has patched a zero-day vulnerability in its BeeStation devices, demonstrated during the recent Pwn2Own competition. The bug, identified as CVE-2025-12686, falls under the category of "buffer copying without input...

Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.
RedWave Team - November 11th, 2025
Many people believe that accessing only HTTPS sites is enough to ensure security when browsing on unsecured Wi-Fi networks. Spoiler alert: this belief is also a false sense of security....

Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?
RedWave Team - November 11th, 2025
It's often thought that avoiding online dangers is as simple as not making payments or entering credentials while browsing. This approach, while seemingly prudent, is profoundly flawed for several reasons—especially...

Protecting your WiFi by hiding the name? This is a false sense of security
RedWave Team - November 11th, 2025
Security, especially when it comes to WiFi networks, is often the subject of misunderstandings and clichés. In this series of articles in our WiFI column , we aim to debunk...

Open WiFi Networks: A Fertile Ground for Cybercrime
RedWave Team - November 11th, 2025
Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing indispensable. This in-depth look at Wi-Fi focuses on a widely...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

