Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European Un...

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting sp...

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware, ransomware, and una...
Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks
The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans
Roblox: The Platform That Puts Children’s Safety at Risk
The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah
21 Years of Firefox: A History of Innovation and Independence
Hyundai subsidiary HAEA data breach: Sensitive information at risk

Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks
Francesco Demarcus - November 11th, 2025
From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new frontier: intelligent systems capable of...

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans
Redazione RHC - November 11th, 2025
It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for building a new...

Roblox: The Platform That Puts Children’s Safety at Risk
Redazione RHC - November 11th, 2025
With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Australia, young players spend an...

The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah
Redazione RHC - November 10th, 2025
A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled " UNIX Original From Bell...

21 Years of Firefox: A History of Innovation and Independence
Redazione RHC - November 10th, 2025
November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla's new browser, which quickly positioned itself as a simple and secure...

Hyundai subsidiary HAEA data breach: Sensitive information at risk
Redazione RHC - November 10th, 2025
HAEA, a subsidiary of South Korean Hyundai Motor Group and headquartered in California, USA, provides customized IT solutions and services for the automotive industry, particularly to Hyundai and Kia subsidiaries....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

