2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556
In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++ incident, now class...
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.
In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed b...
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos
For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM ‘s time seems definitively over. Microsoft has decided to initiate a profound transition that marks the...
The world’s first humanoid robot store has opened in China. Will we be ready?
At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humano...
Douglas Engelbart was born today: the man who saw and invented the digital future.
Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But no, there was s...
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer m...
Latest news
Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager
Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk
BitLocker Under Fire: Microsoft Admits Handing Over Encryption Keys to FBI
Smartphones rented without your knowledge: Google dismantles a global proxy network
AI doesn’t ask for permission: it’s rewriting the rules quickly and probably badly
WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals
Latin America under digital siege: the numbers that worry experts
Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?
n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!
Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.
OpenSSL: 12 security bugs found, including a critical vulnerability
Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials
Cisco Meeting Management Risk: File Upload Could Lead to System Root
Redazione RHC - February 6th, 2026
Shadow Campaigns Exposed: Global Espionage Hitting 37 Countries
Redazione RHC - February 5th, 2026
SystemBC Malware: A Growing Threat to Global Servers
Redazione RHC - February 5th, 2026
Hackers Breach SonicWall, Then Wipe Out Every Security Tool—How?
Redazione RHC - February 5th, 2026
The VMware vulnerability attackers are chaining for full hypervisor takeover
Redazione RHC - February 5th, 2026
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556
Manuel Roccon - February 4th, 2026
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.
Bajram Zeqiri - February 3rd, 2026
What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.
Marcello Filacchioni - February 2nd, 2026
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos
Silvia Felici - February 1st, 2026
SCADA Systems at Risk: Why File System Security Matters More Than Ever
Carolina Vivianti - January 31st, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE











