2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556
In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++ incident, now class...
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.
In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed b...
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos
For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM ‘s time seems definitively over. Microsoft has decided to initiate a profound transition that marks the...
The world’s first humanoid robot store has opened in China. Will we be ready?
At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humano...
Douglas Engelbart was born today: the man who saw and invented the digital future.
Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But no, there was s...
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer m...
Latest news
VoidLink Malware: AI-Generated Threat for Linux Systems
Critical Vulnerability in Modular DS WordPress Plugin – Update Now
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach
Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server
AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime
Microsoft Ends Support for Windows Server 2008: What It Means
The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs
ARM: The Future of Low-Power Computing and AI
Meta Shifts Focus from Metaverse to AI-Powered Wearables
China Leads the Way with Level 3 Autonomous Vehicle License Plates
Understanding Data Breach: Protecting Sensitive Information
1X NEO Robot Unveils World Model for Advanced Learning
Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity
Antonio Piovesan - January 27th, 2026
AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance
Silvia Felici - January 27th, 2026
Active Defense and Hackback: The Legal Labyrinth of Cybersecurity
Paolo Galdieri - January 27th, 2026
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - January 27th, 2026
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - January 27th, 2026
33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps
Roberto Villani - January 27th, 2026
Email Security Under Pressure: Phishing Kits to Double in 2025
Redazione RHC - January 26th, 2026
How a simple Visual Studio Code file can become a backdoor for state-run hackers
Redazione RHC - January 26th, 2026
Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.
Redazione RHC - January 26th, 2026
Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi
Redazione RHC - January 26th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE











