Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Shannon acts as a penetration tester who doesn’t just report vulnerabilities, but launches actual exploits. Shannon’s goal is to breach your web application’s security before anyone with malicio...

The scene is always the same: monitors lit, dashboards full of alerts, logs scrolling too quickly, an anxious customer on the other end of the call. You sit down, look around, and realize that, once a...

A well-known initial access broker (IAB) called ” Storm-0249 ” has changed its operational strategies, using phishing campaigns as well as highly targeted attacks, which exploit the very security ...

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a phone number. The tracking mechanism covers over three billion accounts and allows fo...

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...
The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor
Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.
Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.
Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?
Protecting your WiFi by hiding the name? This is a false sense of security
Open WiFi Networks: A Fertile Ground for Cybercrime

The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor
Redazione RHC - November 11th, 2025
Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expert, public speaker, and writer. He...

Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.
Redazione RHC - November 11th, 2025
Synology has patched a zero-day vulnerability in its BeeStation devices, demonstrated during the recent Pwn2Own competition. The bug, identified as CVE-2025-12686, falls under the category of "buffer copying without input...

Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.
RedWave Team - November 11th, 2025
Many people believe that accessing only HTTPS sites is enough to ensure security when browsing on unsecured Wi-Fi networks. Spoiler alert: this belief is also a false sense of security....

Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?
RedWave Team - November 11th, 2025
It's often thought that avoiding online dangers is as simple as not making payments or entering credentials while browsing. This approach, while seemingly prudent, is profoundly flawed for several reasons—especially...

Protecting your WiFi by hiding the name? This is a false sense of security
RedWave Team - November 11th, 2025
Security, especially when it comes to WiFi networks, is often the subject of misunderstandings and clichés. In this series of articles in our WiFI column , we aim to debunk...

Open WiFi Networks: A Fertile Ground for Cybercrime
RedWave Team - November 11th, 2025
Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing indispensable. This in-depth look at Wi-Fi focuses on a widely...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

