Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Google is getting closer to the official unveiling of Gemini 3.0 , the new artificial intelligence model destined to represent one of the most significant steps in the company’s strategy. According ...

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room as the Mona Lisa. Belgian duo Neel and Senne gained online notoriety by smuggling ...

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial int...

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...
The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans
Roblox: The Platform That Puts Children’s Safety at Risk
The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah
21 Years of Firefox: A History of Innovation and Independence
Hyundai subsidiary HAEA data breach: Sensitive information at risk
Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans
Redazione RHC - November 11th, 2025
It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for building a new...

Roblox: The Platform That Puts Children’s Safety at Risk
Redazione RHC - November 11th, 2025
With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Australia, young players spend an...

The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah
Redazione RHC - November 10th, 2025
A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled " UNIX Original From Bell...

21 Years of Firefox: A History of Innovation and Independence
Redazione RHC - November 10th, 2025
November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla's new browser, which quickly positioned itself as a simple and secure...

Hyundai subsidiary HAEA data breach: Sensitive information at risk
Redazione RHC - November 10th, 2025
HAEA, a subsidiary of South Korean Hyundai Motor Group and headquartered in California, USA, provides customized IT solutions and services for the automotive industry, particularly to Hyundai and Kia subsidiaries....

Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.
Redazione RHC - November 10th, 2025
Researchers discovered several libraries in the public NuGet registry containing code that will be activated in 2027 and 2028. The infected packages target three popular .NET data storage engines (Microsoft...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

