Xi Jinping and the Chinese APT’s Ambition
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability
The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing in React’s serv...
2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Critical Vulnerability in the Linux Kernel: A New Privilege Escalation
A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a special...
RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”
In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of pati...
Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor
On June 17, 2025, a cyber attack paralyzed Bank Sepah, one of Iran’s major financial institutions. The attack was claimed by the Predatory Sparrow group, already known for its destructive operations a...
Skynet is coming: the malware that attacks Artificial Intelligence!
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artifici...
Latest news
Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation.
Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence
Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It
Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back
Robots in search of flesh: When AI rents peripherals. Your body!
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
Google launches Gemini 3, its most advanced artificial intelligence model
Google launches Gemini 3.0 Pro: new multimodal language model
Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models
Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation
Claude Down! Major Anthropic AI Outage Hits All Users
Redazione RHC - March 2nd, 2026
Xi Jinping and the Chinese APT’s Ambition
Alessio Stefan - February 28th, 2026
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability
Carolina Vivianti - February 22nd, 2026
Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation.
Redazione RHC - February 21st, 2026
Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence
Redazione RHC - February 20th, 2026
2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
Alessandro Molinari - February 16th, 2026
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Luca Stivali - February 16th, 2026
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
Sandro Sana - February 14th, 2026
Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It
Redazione RHC - February 9th, 2026
Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back
Redazione RHC - February 9th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE










