RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556
In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++ incident, now class...
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.
In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed b...
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos
For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM ‘s time seems definitively over. Microsoft has decided to initiate a profound transition that marks the...
The world’s first humanoid robot store has opened in China. Will we be ready?
At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humano...
Douglas Engelbart was born today: the man who saw and invented the digital future.
Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But no, there was s...
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer m...
Beware of “I am not a robot”: the malware trap that uses Google Calendar.
A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that malicious peop...
Latest news
Taiwan Citizens Accused in China of Smuggling and Cable Sabotage
QR Code Phishing via HTML: New Attack Vector Emerges
VMware ESXi VM Escape Exploit: Advanced Threats Revealed
Supply Chain Security: Protect Your Business from Cyber Threats
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
Critical RCE Vulnerability in D-Link DSL Routers – Update Now
LED Data Transmission System for Smart Traffic
Microsoft’s AI Future: Models to Systems with Satya Nadella
Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel
China Achieves Quantum Error Correction Breakthrough with Microchip
Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks
US Treasury Removes Sanctions on Intellexa Spyware Developers
MacSync: The macOS malware that empties your wallet… after weeks
Massimiliano Brolli - January 23rd, 2026
He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI
Carlo Denza - January 23rd, 2026
The Thin Red Line of Criminal Liability in Cybersecurity
Paolo Galdieri - January 23rd, 2026
China Bans Western Cybersecurity Software, Cites Security Fears
Agostino Pellegrino - January 22nd, 2026
Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS
Massimiliano Brolli - January 22nd, 2026
OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk
Redazione RHC - January 22nd, 2026
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Sandro Sana - January 22nd, 2026
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Stefano Gazzella - January 22nd, 2026
Zoom Security Alert: Critical Vulnerability in Node MMR Devices
Silvia Felici - January 22nd, 2026
LockBit 5.0 Ransomware: New Threats and Advanced Tactics
Pietro Melillo - January 22nd, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE











