2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556
In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++ incident, now class...
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.
In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed b...
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos
For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM ‘s time seems definitively over. Microsoft has decided to initiate a profound transition that marks the...
The world’s first humanoid robot store has opened in China. Will we be ready?
At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humano...
Douglas Engelbart was born today: the man who saw and invented the digital future.
Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But no, there was s...
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer m...
Latest news
Burnout in Cybersecurity: The Hidden Risk to Your Organization
APT28 Phishing Campaign: Credential Harvesting Tactics
Poisoning AI Data: The New Threat to Machine Learning Models
Pig Butchering Scams Evolve with PBaaS: The New Threat
Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data
Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots
AI-Generated Mac Malware: SimpleStealth Threatens User Security
The Future of Tech: Sovereignty, Security, and Cloud Control
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Lovense Emily AI Doll: Revolutionary Companion at CES 2026
The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History
Cloudflare Hit with €14M Fine for Failing to Block Pirate Content
Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.
Silvia Felici - January 25th, 2026
“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace
Agostino Pellegrino - January 25th, 2026
A working browser built with AI using 3 million lines of code: breakthrough or illusion?
Redazione RHC - January 24th, 2026
Kimwolf: The IoT botnet that moves silently across corporate and government networks
Sandro Sana - January 24th, 2026
NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop
Marcello Filacchioni - January 24th, 2026
Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents
Sandro Sana - January 24th, 2026
CISA Updates Vulnerability Catalog: New Cybersecurity Threats
Agostino Pellegrino - January 24th, 2026
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.
Redazione RHC - January 23rd, 2026
BlueNoroff: The Hacker Group Revolutionizing Cybercrime
Marcello Filacchioni - January 23rd, 2026
Your MFA is no longer enough: Phishing kits bypass multi-factor authentication
Redazione RHC - January 23rd, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE











