2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556
In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++ incident, now class...
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.
In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed b...
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos
For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM ‘s time seems definitively over. Microsoft has decided to initiate a profound transition that marks the...
The world’s first humanoid robot store has opened in China. Will we be ready?
At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humano...
Douglas Engelbart was born today: the man who saw and invented the digital future.
Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But no, there was s...
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer m...
Latest news
CyberVolk Ransomware Flawed: Free File Recovery Possible
AI Smart Glasses for Police: Efficient Vehicle Checks in China
Protecting Loved Ones from Scams and Financial Abuse
VS Code Extensions Infected with Sophisticated Malware via Typosquatting
NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities
How Profanity Varies Across Social Media and Cultures
GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges
Cyber Geopolitics: How Tech Becomes a Global Battleground
CVE-2025-55182 React Server Components Vulnerability Exploited
ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts
Amnesty International Launches .onion Site for Secure Access to Human Rights Info
NANOREMOTE Trojan Uses Google Drive for Command and Control
Lovense Emily AI Doll: Revolutionary Companion at CES 2026
Luca Vinciguerra - January 9th, 2026
The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History
Gaia Russo - January 9th, 2026
Cloudflare Hit with €14M Fine for Failing to Block Pirate Content
Redazione RHC - January 9th, 2026
Taiwan Citizens Accused in China of Smuggling and Cable Sabotage
Sandro Sana - January 9th, 2026
QR Code Phishing via HTML: New Attack Vector Emerges
Silvia Felici - January 8th, 2026
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - January 8th, 2026
VMware ESXi VM Escape Exploit: Advanced Threats Revealed
Silvia Felici - January 8th, 2026
Supply Chain Security: Protect Your Business from Cyber Threats
Redazione RHC - January 8th, 2026
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Agostino Pellegrino - January 8th, 2026
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
Redazione RHC - January 7th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE











