Redazione RHC - January 24th, 2026
A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....
Redazione RHC - January 24th, 2026
The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...
Redazione RHC - January 24th, 2026
Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by...
Redazione RHC - January 24th, 2026
In recent years, Taiwan has seen a series of incidents in which its undersea cables have been damaged or destroyed, creating damage to critical infrastructure and political tensions. The Control...
Redazione RHC - January 24th, 2026
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its catalog of known exploited vulnerabilities (KEVs) with four new entries , demonstrating that hackers are actively exploiting vulnerabilities in popular...
Redazione RHC - January 23rd, 2026
The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever...
Redazione RHC - January 23rd, 2026
The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by...
Luca Stivali - January 23rd, 2026
A widespread and dangerous belief has been circulating in the security world for years: “if it's patched, it's safe” . The case of FortiCloud SSO administrative access to FortiGate devices...
Redazione RHC - January 23rd, 2026
The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure on security teams. Aggressive newcomers Whisper 2FA and GhostFrame introduced...
Redazione RHC - January 23rd, 2026
A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The...