Redazione RHC - January 23rd, 2026
The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever...
Redazione RHC - January 23rd, 2026
The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by...
Luca Stivali - January 23rd, 2026
A widespread and dangerous belief has been circulating in the security world for years: “if it's patched, it's safe” . The case of FortiCloud SSO administrative access to FortiGate devices...
Redazione RHC - January 23rd, 2026
The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure on security teams. Aggressive newcomers Whisper 2FA and GhostFrame introduced...
Redazione RHC - January 23rd, 2026
A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The...
Redazione RHC - January 23rd, 2026
A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It's powered by the MacSync malware, distributed...
Carlo Denza - January 23rd, 2026
How three insiders with just $200 in their pockets reached a market capitalization of $5 trillion and created the company that powers over 90% of artificial intelligence. Kentucky, 1972. A...
Paolo Galdieri - January 23rd, 2026
This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the current regulatory framework. In this first installment, we will analyze...
Redazione RHC - January 22nd, 2026
Chinese authorities have begun quietly eliminating Western solutions from corporate networks in the country. According to Reuters sources, Chinese companies have been advised to stop using cybersecurity software from dozens...
Redazione RHC - January 22nd, 2026
Recently, the Cisco Talos vulnerability research and discovery team identified a number of vulnerabilities in various software. Specifically, three vulnerabilities were discovered in the Foxit PDF Editor , one vulnerability...