Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution, or RCE. This vulnerability allows arbitrary commands to be executed on the attac...

Global traffic, as RHC readers know, travels mostly under the sea. According to TeleGeography, a telecommunications institute, there are more than 530 active submarine optical cable systems worldwide,...

It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents more than a simple commercial partnership, but a tru...

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six mont...

Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. ...
Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World
Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.
Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack.
The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor
Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.
Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.

Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World
RHC Dark Lab - November 12th, 2025
In recent months, the Chinese hacking group known as Salt Typhoon has continued to make headlines for its aggressive and persistent cybersecurity tactics. Despite US sanctions and close government surveillance,...

Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.
Redazione RHC - November 12th, 2025
Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and in some cases superior –...

Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack.
Redazione RHC - November 12th, 2025
We're talking about 11 billion euros. A staggering figure! China's National Computer Virus Emergency Response Center (CVERC) said that a state-run entity, likely U.S. , was behind a 2020 attack...

The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor
Redazione RHC - November 12th, 2025
Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expert, public speaker, and writer. He...

Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.
Redazione RHC - November 12th, 2025
Synology has patched a zero-day vulnerability in its BeeStation devices, demonstrated during the recent Pwn2Own competition. The bug, identified as CVE-2025-12686, falls under the category of "buffer copying without input...

Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.
RedWave Team - November 12th, 2025
Many people believe that accessing only HTTPS sites is enough to ensure security when browsing on unsecured Wi-Fi networks. Spoiler alert: this belief is also a false sense of security....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

