Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
UtiliaCS 970x120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...
Share on Facebook Share on LinkedIn Share on X

Discovering Sandworm: The Kremlin’s National State Group

As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitude of dimensions, including, specifically, nation-state-funded hacker groups...
Share on Facebook Share on LinkedIn Share on X

Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.

Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and in some cases superior –...
Share on Facebook Share on LinkedIn Share on X

Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack.

We're talking about 11 billion euros. A staggering figure! China's National Computer Virus Emergency Response Center (CVERC) said that a state-run entity, likely U.S. , was behind a 2020 attack...
Share on Facebook Share on LinkedIn Share on X

Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.

Synology has patched a zero-day vulnerability in its BeeStation devices, demonstrated during the recent Pwn2Own competition. The bug, identified as CVE-2025-12686, falls under the category of "buffer copying without input...
Share on Facebook Share on LinkedIn Share on X

Midnight Ransomware: A free decryptor has been released thanks to a bug in the code.

Researchers have discovered a vulnerability in the new Midnight ransomware , based on the old Babuk source code. The malware is marketed as an "advanced" version of the malware, but...
Share on Facebook Share on LinkedIn Share on X

NetScaler ADC and Gateway Vulnerable: Urgent Updates to Prevent XSS Attacks

NetScaler and Citrix - On November 11, 2025, released security bulletin CTX695486 regarding the CVE-2025-12101 vulnerability, which affects the NetScaler ADC and NetScaler Gateway products. The vulnerability is rated "...
Share on Facebook Share on LinkedIn Share on X

LLM: Wikipedia Parasites: The Importance of Humanity in the Age of Artificial Intelligence

In the age of rapid advances in artificial intelligence, Wikipedia's importance as a reliable source of knowledge has become particularly significant. While neural networks generate text, images, and videos, their...
Share on Facebook Share on LinkedIn Share on X

OWASP Top 10 2025: New Web Application Threats, Supply Chain Top Three

After four years, OWASP has updated its TOP 10 list of the most dangerous web application risks, adding two new categories and revising the ranking structure. The organization has released...
Share on Facebook Share on LinkedIn Share on X

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...
Share on Facebook Share on LinkedIn Share on X