2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556
In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++ incident, now class...
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.
In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed b...
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos
For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM ‘s time seems definitively over. Microsoft has decided to initiate a profound transition that marks the...
The world’s first humanoid robot store has opened in China. Will we be ready?
At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humano...
Douglas Engelbart was born today: the man who saw and invented the digital future.
Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But no, there was s...
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer m...
Latest news
Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed
New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals
Netshacker: Retrogaming e Hacking Reale su Commodore 64
Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!
Microsoft Introduces POML for Orchestrating LLM Prompts
CISO vs. DPO: Collaboration or Cold War in Business?
Revolutionize security models with the Unified SASE framework
New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!
Jaguar Land Rover victim of hacker attack: production halted!
AI will grow by 50% and so will your anxiety about your electricity bill.
Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone.
Critical vulnerability in IIS Web Deploy: PoC exploit is now public
Cyber Incident Management in the NIS2 Era
Giancarlo Di Lieto - October 30th, 2025
Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit
Manuel Roccon - October 29th, 2025
183 million Gmail accounts hacked! But it was just a hoax
Sandro Sana - October 29th, 2025
Microsoft acquires 27% of OpenAI for $135 billion
Redazione RHC - October 29th, 2025
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Agostino Pellegrino - October 29th, 2025
ClayRat: The spyware that targets Android users with self-propagation
Bajram Zeqiri - October 29th, 2025
Be careful what you tell AI! It could be confidential data
Filippo Boni - October 29th, 2025
Europe vs. Silicon Valley: “AI First” kicks off in Turin with von der Leyen
Carlo Denza - October 28th, 2025
“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
Olivia Terragni - October 28th, 2025
Gemini 3.0 Pro: What people who are trying it say
Redazione RHC - October 28th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE











