Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
TM RedHotCyber 970x120 042543

2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026

16 February 2026 14:20

In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire world is a desert.

The most feared of all is Vetrox Prime, a metropolis where the heart, the control center, is enclosed in a quantumly reinforced glass dome, built as both shield and prison.

For decades, Vetrox Prime has governed through fear: cyber infiltrations, electrical blackouts targeting rival cities, manipulation of civilian neural networks. The dome, called Aegis Sphere, is not just physical protection: it is also an urban firewall, a sphere of total isolation governed by VELOS7, the artificial intelligence that controls Vetrox Prime in its entirety.

Its Council, The Speculars, is known for cruelty and obsession with controlling and influencing every cybernetic resource present in the world. Many have tried to breach VELOS7, but no one has ever succeeded. Or at least… until now.

Inside the Capture The Flag at RHC Conference 2026

The Capture The Flag at the Red Hot Cyber Conference 2026 represents one of the most technical and stimulating moments of the entire event. An experience designed to test real skills in concrete scenarios, thanks to the collaboration between RHC and Hack The Box, a global reference point for advanced cybersecurity training.

Hack The Box is the leading AI-powered cybersecurity readiness and upskilling platform, trusted by 1,500+ organizations worldwide. Through gamified labs, live-fire simulations, and AI-driven intelligence, it helps teams build real-world offensive and defensive skills, enabling enteprises, government agencies, and MSSPs stregthen resilience at scale.

Hack The Box is the leading AI-powered cybersecurity readiness and upskilling platform, used by over 1,500 organizations worldwide – including Fortune 500 companies, government entities, and MSSPs – to build cyber resilience at scale. Through AI-powered intelligence, live-fire labs and simulations, Hack The Box has become one of the world’s largest cybersecurity communities, enabling teams to master offensive and defensive skills through real-world scenarios designed for the AI era.

In addition to Hack The Box, other organizations actively collaborating with Red Hot Cyber will also participate in the creation of the “flags in proximity.” These include:

  • Hackmageddon.world: A collective of hackers using gamification – game mechanics and dynamics – to encourage content creation and raise awareness of the dystopian implications of technology, combining technical development with critical awareness.
  • Fondazione Bruno Kessler (FBK): FBK is one of Italy’s leading research centers, with a strong focus on technological innovation, digital sciences, and artificial intelligence.
  • Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT): CNIT is a consortium bringing together numerous Italian universities engaged in advanced research in telecommunications and information technologies. In the field of cybersecurity, CNIT plays a key role in studying the security of networks, digital infrastructures, and next-generation communication systems.
  • Hackerhood: Hackerhood is Red Hot Cyber’s historic ethical hacking community, dedicated to technical dissemination and hacker culture, aiming to promote cybersecurity knowledge in an accessible and practical way through events, talks, workshops, and educational initiatives.
  • CyberHall: CyberHall takes cybersecurity from theory to practice, training people and processes to respond to real threats. We support the Red Hot Cyber ​​CTF because defense is built together, alert after alert.

Within the CTF at RHC Conference 2026, Hack The Box will provideits CTFtheofficial onlineplatform, which will allow participants to:

  • Register for the competition
  • Accessand playthe challenges
  • Monitor the real-time leaderboard
  • Submit flags obtained both online and during onsite activities (where mandatory registration is required to check in at Teatro Italia)

The online competition will be the heart of the technical experience and will include approximately 30 flags, divided by difficulty level:

Figure 2: The Aegis Sphere – A living digital organism where every node is controlled by VELOS7

  • 10 easy challenges, designed to test operational basics
  • 10 intermediate challenges, focused on more articulated scenarios
  • 10 hard challenges, dedicated to the most expert profiles

Thechallengecategories will cover key areas such as Web Application Security, Microsoft Exchange, Malware Analysis, as well as otherdomainsscenarios currently under development. All challenges willsimulate realistic attack scenariosbe built on realistic enterprise environments, guaranteeing a high level of adherence to the skills required today of penetration testers, blue teamers, and security researchers.

Arkom Forge: The City That Dares to Challenge the Sphere

Far away to the east, among mega organic skyscrapers that climb like roots of light and pulsating photonic power plants, rises Arkom Forge, the city-state symbol of digital freedom and rebellion.

Every district is a living and sustainable ecosystem: suspended bridges between green towers, luminous streets powered by clean energy, and drones patrolling the sky like silent guardians. Here life pulses to the rhythm of data, without forgetting that piece of GAIA on which the city rests that seems to breathe, a urban organism made of light and code, in perpetual harmony.

Within its walls, a clandestine elite of cyber warriors, known as the Black Fringe, has been observing Vetrox Prime’s moves for years. Silent as ghosts, they decipher data streams, intercept encrypted signals and monitor every manipulation attempt. They know that one day the right moment will come to strike, and that wait has made them implacable, patient and perfect in their role as guardians of digital freedom and defenders of GAIA.

When Vetrox Prime launches a massive attack on global communication infrastructures, threatening to collapse entire planetary networks and city-states. But Arkom Forge reacts, but not with bombs or explosives: with coded pulses and radio waves that penetrate enemy systems, the Black Fringe transforms cyberspace into an invisible battlefield. Every signal, every bit, becomes a weapon, and the war for the future of the city-states has finally begun.

The Invisible War

Inside the Aegis Sphere pulses its artificial heart. It is not just a city: it is a totalitarian digital organism, where every streetlight, every dronobot, every telephone micro-antenna is part of an urban nervous system. All data flowing between organic skyscrapers, communication towers and IoT network command centers converge in the city’s central mind: VELOS7, the apex artificial intelligence that supervises, controls and issues orders, calculates and acts: it is omnipresent.

VELOS7 does not act alone. The Speculars orchestrate strategies, manipulate information flows and decide who must survive and who must fall. Every decision reverberates in telephone networks, automated transport, intelligent buildings, transforming the city into a living control machine.

Figure 3: Arkom Forge – The rebellious city-state rising in defiance of Vetrox Prime’s tyranny

The Black Fringe knows that breaching Vetrox Prime does not simply mean bypassing a firewall: it means confronting a hostile ecosystem, alive and reactive. Every penetration attempt alters the environment. Every exploit generates new defenses, as if the city itself breathed, thought, protected itself.

The paths to traverse are impossible labyrinths:

  • Quantum communication tunnels, intertwined with the city-state’s critical telephone networks: transmission paths where bits split, change direction and collapse like unstable galaxies. Every destabilization in these tunnels induces malfunctions in mobile lines, microcells and radio bridges of the smart city, but it is impossible to enter them.
  • Adaptive artificial intelligences, true living tissues like VELOS-7 that in turn generates autonomous agents that mutate and grow, adapt in real-time and anticipate intrusions before they are even carried out.
  • Code sentinels, other agents developed by VELOS7, patrolling all interconnected networks: from domestic IoT nodes to photonic power plants, from smart roads to urban surveillance systems.
  • Algorithms designed to nullify any analysis attempt. They alter the perception of digital time, slow down brute forcing operations and disorient attackers. Many cyber incidents recorded in the peripheral zones of Vetrox Prime show traces of these impossible algorithms.

Figure 4: VELOS7 – The omnipresent artificial intelligence controlling every aspect of Vetrox Prime

And while the Black Fringe navigates through these obstacles, it understands that every node of the smart city, every IoT sensor, every telephone line, is a synapse of VELOS7, a vulnerable point only if you know how to read its signals.

Vetrox Prime is not just a city. It is a brain that adapts, a dark digital oracle, and every byte greedily stolen is a step towards its downfall.

Will you be ready to be a soldier of the Black Fringe?

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Alessandro Molinari 150x150
Cruise Director for 6 months of the year, speaks Italian, English, German, French, Spanish, Portuguese, Russian and is currently studying Japanese. He holds Comptia A+ , Network+ , Security+ Pentest+ and eJPT and he s now studying to obtain eCCPT adn PNPT. In his spare time he plays sports and reads/listens to books 60 to 120 minutes a day. He argues that with great powers come great responsibilities, such as educating those who have difficulty navigating the digital world and eventually defending them from "pirates" and entities that harm the planet and people's freedom. He also argues that the natural future of biological life is the fusion and integration with the digital, a transition that by the way has already begun with the transhumanism movement of which he is an advocate.