2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556
In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++ incident, now class...
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.
In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed b...
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos
For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM ‘s time seems definitively over. Microsoft has decided to initiate a profound transition that marks the...
The world’s first humanoid robot store has opened in China. Will we be ready?
At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humano...
Douglas Engelbart was born today: the man who saw and invented the digital future.
Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But no, there was s...
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer m...
Latest news
NightshadeC2, the new botnet that uses unconventional methods to bypass protection
WhatsApp and Apple in emergency: DNG bug allows remote control without clicking
Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm
Apple launches Security Research Device 2026 program for security researchers
Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach
9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!
AI needs a shrink! It can be fooled like humans.
Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence
Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.
Toha Arrest: The Future of the Black Market After XSS Shuts Down
Digital blackout: Broken undersea cables in the Red Sea slow down Microsoft’s cloud.
Geoffrey Hinton’s shocking revelations: Better to trust China than Zuckerberg!
Android Malware Steals NFC-Enabled Credit Cards
Massimiliano Brolli - November 1st, 2025
Le Security Operations al tempo dell’Artificial Intelligence
Redazione RHC - November 1st, 2025
The race for cybersecurity has begun and Italy is running with its shoes tied
Fabrizio Saviano - November 1st, 2025
Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally
Luca Stivali - November 1st, 2025
The Louvre Theft: When Thieves Taught the World the Physical Pen Test
Luca Errico - November 1st, 2025
Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?
Bajram Zeqiri - October 31st, 2025
AzureHound: The “Legitimate” Tool for Cloud Attacks
Luca Galuppi - October 31st, 2025
Red Hot Cyber launches free real-time CVE Enrichment service
Silvia Felici - October 31st, 2025
Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything
Silvia Felici - October 31st, 2025
Mossad, the rigged supply chain, and intimidated judges
Sandro Sana - October 31st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE











