<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HTB Blog > All Content</title>
        <link>https://www.hackthebox.com/rss/blog/all</link>
        <description>All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more</description>
        <language>en</language>
        <atom:link href="https://www.hackthebox.com/rss/blog/all" rel="self" type="application/rss+xml" />
        <image>
            <url>
                https://www.hackthebox.com/images/landingv3/logo-htb-blog.svg
            </url>
            <title>HTB Blog > All Content</title>
            <link>https://www.hackthebox.com/rss/blog/all</link>
        </image>
                    <item>
                <title>Hack The Box Report Reveals AI-Driven Shift Reshaping Cybersecurity Skills and Talent Strategy</title>
                <link>https://www.hackthebox.com/blog/htb-cybersecurity-workforce-intelligence-report</link>
                <description>New global data shows AI is changing cybersecurity roles, accelerating demand for advanced capabilities and forcing CISOs to rethink workforce planning</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/rg904VaPKwlhDMqDNj7p7aPilQb9NyMo.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 19 May 2026 09:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/htb-cybersecurity-workforce-intelligence-report</guid>
            </item>
                    <item>
                <title>AI won’t replace cyber teams. It will redefine what great teams look like.</title>
                <link>https://www.hackthebox.com/blog/rsac-2026-interview-htb</link>
                <description>Reflections from Gerasimos Marketos, Chief Product Officer at Hack The Box (HTB), following his RSAC 2026 interview on the Security by Default podcast.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/MRlFyrF45rv7AqniajlySox0LbzapPtZ.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 14 May 2026 14:15:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/rsac-2026-interview-htb</guid>
            </item>
                    <item>
                <title>Lloyds Banking Group, Hack The Box, and Google Cloud Security host the first UK Financial Services Security Hackathon</title>
                <link>https://www.hackthebox.com/blog/lloyds-banking-google-cloud-security-htb-hackathon</link>
                <description></description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/XBVvjbUz6AGpYfBTAY9u2GZsWXRUCgNL.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 13 May 2026 15:08:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/lloyds-banking-google-cloud-security-htb-hackathon</guid>
            </item>
                    <item>
                <title>War Room: Linux Kernel &quot;Copy Fail&quot; LPE (CVE-2026-31431) Exploit Analysis and Defense Strategy</title>
                <link>https://www.hackthebox.com/blog/linux-kernel-copy-fail-cve-2026-31431</link>
                <description>CVE-2026-31431 &quot;Copy Fail&quot; is a deterministic Linux LPE flaw granting root access across cloud workloads. Understand the business risks and immediate actions required.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/nZElbTJEmzGTOUYYB3xsYXogXN3PtFSn.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 11 May 2026 13:20:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/linux-kernel-copy-fail-cve-2026-31431</guid>
            </item>
                    <item>
                <title>Continuous readiness, zero downtime: Train your SOC without slowing it down</title>
                <link>https://www.hackthebox.com/blog/continous-readiness-train-your-soc</link>
                <description>Stop pausing your SOC. Learn how LetsDefend and HTB turn downtime into high-impact learning for continuous readiness without sacrificing operational coverage.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/5CLK50hUD23TztR5vUypc7YVXNUxcTVi.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 07 May 2026 12:05:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/continous-readiness-train-your-soc</guid>
            </item>
                    <item>
                <title>Global Cyber Skills Benchmark 2026: 5 Reasons Your Team Must Join</title>
                <link>https://www.hackthebox.com/blog/global-cyber-skills-benchmark-2026</link>
                <description>Join GCSB 2026: Task Force Nightfall on May 15. A free, worldwide CTF for corporate teams. Hunt APTs and win from a $38k prize pool.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/WE0IslmBpIlt8ec0tZr3vJoFmEUITyy1.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 06 May 2026 12:50:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/global-cyber-skills-benchmark-2026</guid>
            </item>
                    <item>
                <title>Inside Hack The Box’s contribution to Locked Shields 2026</title>
                <link>https://www.hackthebox.com/blog/hack-the-box-locked-shields-2026</link>
                <description></description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/HzkMV2UW2nVSU7CB1RaSKB1PEsQNYNaC.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 05 May 2026 14:43:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/hack-the-box-locked-shields-2026</guid>
            </item>
                    <item>
                <title>The Notebook You Trust Could Be Reading Your Secrets</title>
                <link>https://www.hackthebox.com/blog/path-traversal-vulnerabilities-in-jupyter-nbconvert</link>
                <description>Think Jupyter notebooks are safe? This breakdown reveals how nbconvert path traversal flaws allow file reads and writes without ever executing a single cell.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/cgr1GeCqQHtyRNdOoT84eek4NtYnyBa8.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 28 Apr 2026 14:23:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/path-traversal-vulnerabilities-in-jupyter-nbconvert</guid>
            </item>
                    <item>
                <title>The automation paradox: A new era of systemic risk</title>
                <link>https://www.hackthebox.com/blog/the-automation-paradox</link>
                <description>The structural integrity of global authentication is facing a new form of pressure.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/emyzHlqTgF1xW6iDPpO0kHTkELU3Viom.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 24 Apr 2026 13:59:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/the-automation-paradox</guid>
            </item>
                    <item>
                <title>Semperis names Hack The Box to its Action Partner network for Midnight in the War Room to amplify global cyber resilience efforts</title>
                <link>https://www.hackthebox.com/blog/semperis-names-htb-action-partner</link>
                <description></description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/UU9YPjmHl6CQwT0mcootCwI5zpsyXOeB.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 21 Apr 2026 09:25:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/semperis-names-htb-action-partner</guid>
            </item>
                    <item>
                <title>Make every step count with HTB XP: Our new unified progression system</title>
                <link>https://www.hackthebox.com/blog/XP-Points</link>
                <description>Are you ready to get some XP? Check out this blog and learn how your lifetime efforts on HTB will be ranked!</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Kl5tN8nAbKZVfOIwwfgaQ6bMk6CQYCyk.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 20 Apr 2026 12:20:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/XP-Points</guid>
            </item>
                    <item>
                <title>Hack The Box wins 2026 industry awards as it builds the future of cyber readiness</title>
                <link>https://www.hackthebox.com/blog/htb-wins-2026-industry-awards</link>
                <description></description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pRggg6zuoHMepDzCjsyM75TrwMiTh9SS.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 16 Apr 2026 11:10:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/htb-wins-2026-industry-awards</guid>
            </item>
                    <item>
                <title>Be the human element in AI hacking with HTB COAE</title>
                <link>https://www.hackthebox.com/blog/HTB-COAE-Announcement</link>
                <description>Join us for the launch of the HTB Certified Offensive AI Expert (HTB COAE). The future includes hackers who know how to attack AI.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/aLSycmLL4RHilXtNA1YPjEMR1xyjmS7K.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 02 Apr 2026 12:11:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/HTB-COAE-Announcement</guid>
            </item>
                    <item>
                <title>War Room: CVE-2026-27944 &amp; CVE-2026-3888</title>
                <link>https://www.hackthebox.com/blog/CVE-2026-27944-CVE-2026-3888</link>
                <description>Learn all about CVE-2026-27944 and CVE-2026-3888, two high-impact vulnerabilities affecting Nginx-UI and snapd, enabling unauthenticated data exposure and local privilege escalation.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/nZElbTJEmzGTOUYYB3xsYXogXN3PtFSn.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 23 Mar 2026 13:27:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/CVE-2026-27944-CVE-2026-3888</guid>
            </item>
                    <item>
                <title>Hack The Box named a Leader in Independent Cybersecurity Skills and Training Platform Evaluation</title>
                <link>https://www.hackthebox.com/blog/hack-the-box-named-leader-forrester-wave-cybersecurity-training-platforms-2026</link>
                <description>Cybersecurity upskilling innovator receives highest possible scores in 13 criteria, including Agentic AI readiness, gamification, competition and recognition, accessibility, and community</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/fBbYydOze7gWgVf5oocN2uIbwzGENA7S.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 11 Mar 2026 14:03:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/hack-the-box-named-leader-forrester-wave-cybersecurity-training-platforms-2026</guid>
            </item>
                    <item>
                <title>Hack The Box: A Leader in The Forrester Wave for Cybersecurity Skills and Training Platforms</title>
                <link>https://www.hackthebox.com/blog/hack-the-box-forrester-cybersecurity-training-leader-2026</link>
                <description>Hack The Box has been named a Leader in The Forrester Wave: Cybersecurity Skills and Training Platforms. Again.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/TZKxnBYcJIRc8PKONj8gJDLSYLLRItzw.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 11 Mar 2026 14:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/hack-the-box-forrester-cybersecurity-training-leader-2026</guid>
            </item>
                    <item>
                <title>Stop hiring like it&#039;s 2025: AI-augmented cybersecurity performance data every CISO needs</title>
                <link>https://www.hackthebox.com/blog/ai-vs-human-cybersecurity-benchmark</link>
                <description>Why Hack The Box’s largest AI vs. human Capture The Flag (CTF) study matters for CISOs and business leaders, and how to act now</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/gXMKX6z3HB26u51mR2OIhOuu1W1Vxjcd.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 05 Mar 2026 10:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/ai-vs-human-cybersecurity-benchmark</guid>
            </item>
                    <item>
                <title>Hack The Box benchmark report finds AI boosts cybersecurity productivity 3-4x for AI-augmented elite teams, but cautions on a talent pipeline risk</title>
                <link>https://www.hackthebox.com/blog/hack-the-box-ai-cybersecurity-benchmark-report</link>
                <description>Largest AI vs. human CTF study reveals significant speed gains for elite teams, exposes inflection points for junior and mid-tier talent, and underscores the need for an AI-fluent workforce</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/gXMKX6z3HB26u51mR2OIhOuu1W1Vxjcd.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 05 Mar 2026 10:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/hack-the-box-ai-cybersecurity-benchmark-report</guid>
            </item>
                    <item>
                <title>Hack The Box and C3SA partner to strengthen cyber resilience across Canada</title>
                <link>https://www.hackthebox.com/blog/htb-c3sa-partnership</link>
                <description>Partnership aims to advance Canada’s cybersecurity mission through continuous readiness, hands-on workforce development, and operational resilience.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/FffuOSHKEfuZ1KDe447a6GYMlWMV9ghR.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 02 Mar 2026 13:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/htb-c3sa-partnership</guid>
            </item>
                    <item>
                <title>Offensive AI security: How to hack the models before you get hacked</title>
                <link>https://www.hackthebox.com/blog/offensive-ai-security-ctf-llm-prompt-injection-ml-backdoors</link>
                <description>Learn how offensive AI security exposes LLM, agent, and ML vulnerabilities—from prompt injection to model backdoors—and how CTF training helps teams secure before the attackers exploit them.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/MbSexFQPbeSavnvMPyU8xA322DnIliFJ.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 17 Feb 2026 10:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/offensive-ai-security-ctf-llm-prompt-injection-ml-backdoors</guid>
            </item>
                    <item>
                <title>Meet the HTB Profile: all your skills, in one place</title>
                <link>https://www.hackthebox.com/blog/introducing-htb-profile</link>
                <description>The HTB Profile is now live, bringing your skills, progress, and achievements into one clean view. Show the world where you stand and what you’ve mastered.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pGjlaysy1EToeeuW2FTr2G4RGG8caHre.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 12 Feb 2026 06:24:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/introducing-htb-profile</guid>
            </item>
                    <item>
                <title>Benchmarking LLMs for cybersecurity: Inside HTB AI Range’s first evaluation</title>
                <link>https://www.hackthebox.com/blog/ai-range-llm-security-benchmark</link>
                <description>Discover how Hack The Box AI Range benchmarks LLMs in realistic cyber scenarios. Explore the methodology, key findings, and why it sets a new standard for AI security performance.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/18OiTQGyf8gxqp1WTSOpkxupxrRoovQC.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 12 Feb 2026 04:03:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/ai-range-llm-security-benchmark</guid>
            </item>
                    <item>
                <title>Enterprise Wi-Fi: The most trusted attack surface you’re NOT testing (and how to fix that)</title>
                <link>https://www.hackthebox.com/blog/enterprise-wifi-pentesting-risk-cwpe</link>
                <description>Enterprise Wi-Fi is a high-risk but under-tested attack surface. Learn how modern wireless attacks work and how HTB CWPE builds real-world Wi-Fi pentesting skills.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/6ryCkxYwto6DzQgcJeVtdSb3l19F8hmu.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 10 Feb 2026 11:35:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/enterprise-wifi-pentesting-risk-cwpe</guid>
            </item>
                    <item>
                <title>Continuous AI evaluations: Why every sector needs to test and trust AI models</title>
                <link>https://www.hackthebox.com/blog/ai-range-use-cases</link>
                <description>AI model evaluation is now essential for secure AI in cybersecurity. See how teams use HTB AI Range to test, validate safety, and harden models against evolving threats.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/VQfqLsW9BE9PxpfJQcSF7xQKnkYNVy2O.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 10 Feb 2026 02:48:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/ai-range-use-cases</guid>
            </item>
                    <item>
                <title>How AI is changing cybersecurity: 8 takeaways from our expert webinar</title>
                <link>https://www.hackthebox.com/blog/ai-security-key-takeaways-webinar-cybersecurity</link>
                <description>AI security in 2026 is redefining cybersecurity. Discover 8 key takeaways from our expert webinar on AI-driven threats, autonomous systems, and how security teams must adapt.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/vCnaItAqdZzWbrNQCEYNksmkz9oMS2eI.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 09 Feb 2026 11:15:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/ai-security-key-takeaways-webinar-cybersecurity</guid>
            </item>
                    <item>
                <title>Detecting and investigating Command-and-Control (C2) Communication: A quick guide for security teams</title>
                <link>https://www.hackthebox.com/blog/detecting-investigating-c2-communication</link>
                <description>Learn how to detect and investigate command-and-control (C2) communication using log analysis, network traffic monitoring, EDR, and threat intelligence.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/qRdoVfNvAr4Pr8xNx0pSoxViWNrqSrBi.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 05 Feb 2026 14:18:42 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/detecting-investigating-c2-communication</guid>
            </item>
                    <item>
                <title>Netpoleon and Hack The Box partner to strengthen cybersecurity skills across Australia and New Zealand</title>
                <link>https://www.hackthebox.com/blog/netpoleon-hack-the-box-partnership-anz-cybersecurity-skills</link>
                <description>Netpoleon partners with Hack The Box to bring hands-on, AI-driven cybersecurity training to Australia and New Zealand, helping organisations build real-world cyber skills.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Et2OqrtHajxFTIJOy5VvGKN0ITYOGrxz.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 03 Feb 2026 08:05:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/netpoleon-hack-the-box-partnership-anz-cybersecurity-skills</guid>
            </item>
                    <item>
                <title>NetworkMiner on Linux: Where traditional packet analysis still fits in modern incident response</title>
                <link>https://www.hackthebox.com/blog/networkminer-linux-packet-analysis-incident-response</link>
                <description>NetworkMiner remains a practical network forensics tool for Linux-based incident response. Learn where packet analysis still delivers value in modern security operations.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/fLHc9xGCSqra11Iw0xpsV55znWGey0iK.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 02 Feb 2026 12:05:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/networkminer-linux-packet-analysis-incident-response</guid>
            </item>
                    <item>
                <title>Federal judiciary cyber breach: How SolarWinds and Legacy Systems left US courts exposed</title>
                <link>https://www.hackthebox.com/blog/us-federal-judiciary-cyberattacks-solarwinds-pacer</link>
                <description>A technical breakdown of the 2020 and 2025 cyberattacks on US federal judiciary systems, including SolarWinds, PACER vulnerabilities, and key defensive lessons.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/QniNTyrJyxqVYSS7s2DMlldQ7mxgvIwr.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 30 Jan 2026 13:57:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/us-federal-judiciary-cyberattacks-solarwinds-pacer</guid>
            </item>
                    <item>
                <title>Bring your attack surface to the air with the HTB Certified Wi-Fi Pentesting Expert (HTB CWPE)</title>
                <link>https://www.hackthebox.com/blog/HTB-CWPE-announcement-blog</link>
                <description>Crack open the HTB CWPE&#039;s network exam and add Wi-Fi pentesting skills to your arsenal of corporate level attacks</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/a5GGtyxLlkkVJ4Apy7Ccj4dBIH5pmQGs.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 29 Jan 2026 09:58:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/HTB-CWPE-announcement-blog</guid>
            </item>
                    <item>
                <title>Beyond demos: How can enterprises evaluate AI SOC capabilities?</title>
                <link>https://www.hackthebox.com/blog/evaluate-ai-soc-agents-htb-ai-range</link>
                <description>AI SOC agents are transforming security operations. Learn how to evaluate their real impact, and how Hack The Box AI Range helps benchmark their performance.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/U787pWwv6W08D5Ippg17on0wnX5gLJln.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 29 Jan 2026 02:25:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/evaluate-ai-soc-agents-htb-ai-range</guid>
            </item>
                    <item>
                <title>Ni8mare fuel: Chaining n8n CVEs for full compromise in automated workflows</title>
                <link>https://www.hackthebox.com/blog/n8n-ni8mare-cve-2026-21858-cve-2025-68613</link>
                <description>Dive into Ni8mare (CVE-2026-21858) and CVE-2025-68613—two critical n8n bugs that chain into unauthenticated RCE. See the exploit in action and practice on our new BloodFlow machine.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/BQThGNZAXky2b7XCNCJvPERAFHKs87uR.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 28 Jan 2026 16:08:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/n8n-ni8mare-cve-2026-21858-cve-2025-68613</guid>
            </item>
                    <item>
                <title>The reality of cybersecurity careers: Benefits, challenges, career paths</title>
                <link>https://www.hackthebox.com/blog/cybersecurity-careers-pros-cons-salaries</link>
                <description>Explore the real pros and cons of cybersecurity careers in 2025, including salaries, job security, career paths, and workplace realities.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/oGs8hCk1oXBwmnNugMSRd5dw4132Tghh.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 27 Jan 2026 11:11:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/cybersecurity-careers-pros-cons-salaries</guid>
            </item>
                    <item>
                <title>A global community of hackers battle it out for a top spot in Season 10: Underground</title>
                <link>https://www.hackthebox.com/blog/HTB-Season-10-Underground</link>
                <description>Our 10th Seasonal competition focuses on you! Underground is a celebration of hackers that make each Season shine.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/uDEZZAJrQXztpYnK5RDstgbtPHhwwgB7.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 23 Jan 2026 18:24:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/HTB-Season-10-Underground</guid>
            </item>
                    <item>
                <title>How to learn hacking: The (step-by-step) beginner&#039;s bible for 2026</title>
                <link>https://www.hackthebox.com/blog/learn-to-hack-beginners-bible</link>
                <description>The truth behind learning the wonderful wizardry of hacking. Here&#039;s what it takes to learn hacking from scratch and the necessary steps to get started!</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/xiVI1tfThbk6min6LJesRzDNvF2ofKFN.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 19 Jan 2026 02:23:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/learn-to-hack-beginners-bible</guid>
            </item>
                    <item>
                <title>Hack The Box appointed to deliver mission-aligned cyber readiness training to the FBI</title>
                <link>https://www.hackthebox.com/blog/hack-the-box-supports-fbi-cyber-training-idiq-with-solutions3</link>
                <description>Hands-on, threat-realistic cyber labs will support operational readiness across structured FBI learning pathways, in partnership with Solutions³ LLC.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/rf7f6yqW1HpQXhNh5CViUvmDJEgynymP.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 14 Jan 2026 17:08:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/hack-the-box-supports-fbi-cyber-training-idiq-with-solutions3</guid>
            </item>
                    <item>
                <title>Inclusivity, opportunity, impact: CodeFest 2025 powered by NAB + HTB</title>
                <link>https://www.hackthebox.com/blog/codefest-ctf-2025-htb-nab</link>
                <description>Discover how NAB and Hack The Box brought CodeFest 2025 to life with an inclusive, hands-on CTF that’s shaping Australia’s next generation of cybersecurity talent.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/KnnfJDoZWg3tElpo5c4Z2AjD0yniRvbm.png" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 14 Jan 2026 11:28:10 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/codefest-ctf-2025-htb-nab</guid>
            </item>
                    <item>
                <title>Dedispawn for all! The future of HTB Labs is a smoother hacking experience and more content releases</title>
                <link>https://www.hackthebox.com/blog/quality-hacking-labs-experience-with-dedispawn</link>
                <description>Discover how our dedicated Machine instances will deliver a much smoother hacking experience on HTB Labs.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/URH4oqFuIy2z0I8Ytgchv6PC8uCKb43A.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 13 Jan 2026 08:30:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/quality-hacking-labs-experience-with-dedispawn</guid>
            </item>
                    <item>
                <title>More than badges: What Hack The Box’s G2 Winter 2026 leadership says about real-world cyber skills</title>
                <link>https://www.hackthebox.com/blog/g2-winter-2026-badges-cybersecurity-skills-leadership</link>
                <description>HTB wins nine G2 Winter 2026 badges, recognizing leadership in cybersecurity training, technical skills development, and global workforce upskilling based on real customer reviews.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/fXfOnZTWIyH9eoufJpHj94NjeMvLWm5a.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 12 Jan 2026 12:37:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/g2-winter-2026-badges-cybersecurity-skills-leadership</guid>
            </item>
                    <item>
                <title>War Room: CVE-2025-14847—Mongobleed explained</title>
                <link>https://www.hackthebox.com/blog/war-room-mongobleed-cve-2025-14847-mongodb-memory-leak-vulnerability</link>
                <description>Learn all about CVE-2025-14847, the High Vulnerability MongoDB memory leak vulnerability allowing unauthenticated memory disclosure.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/UHhmu7zgdw3iTiU7R2u3QJCXQ06b4SPp.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 07 Jan 2026 12:30:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/war-room-mongobleed-cve-2025-14847-mongodb-memory-leak-vulnerability</guid>
            </item>
                    <item>
                <title>Cybersecurity blue team jobs in 2026: Roles, salaries, skills, and where to start</title>
                <link>https://www.hackthebox.com/blog/cybersecurity-blue-team-jobs-roles-salaries-skills</link>
                <description>Explore top blue team cybersecurity jobs in 2026, including SOC, IR, threat intel, and security engineering roles. Learn skills, career paths, and salaries.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/PV9yXUvxb8eOJje4JgXLsKQzORklK3fZ.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 02 Jan 2026 18:47:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/cybersecurity-blue-team-jobs-roles-salaries-skills</guid>
            </item>
                    <item>
                <title>Adversarial AI meets its match: The complete AI Red Teamer Path from HTB and Google</title>
                <link>https://www.hackthebox.com/blog/ai-red-teamer-path-complete-offense-defense-privacy</link>
                <description>Our AI Red Teamer Path is complete, with hands-on AI Defense and AI Privacy modules, helping security teams harden models, prevent data leakage, and stay ahead of emerging AI threats.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/52wfWIGisXcjSjpJEOCG9UTQVqBp9WTg.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 23 Dec 2025 04:17:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/ai-red-teamer-path-complete-offense-defense-privacy</guid>
            </item>
                    <item>
                <title>Meet Windows Pwnbox: Same browser. Bigger playground. Better training.</title>
                <link>https://www.hackthebox.com/blog/windows-pwnbox-enterprise-cyber-training</link>
                <description>Launch Windows Pwnbox for enterprise teams. Train blue and red teams in native Windows and Linux environments, fully in-browser, with no setup or infrastructure overhead.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/4ioYPTVnGziiauxEAsqJAMGxPkhIiyZv.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 23 Dec 2025 03:13:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/windows-pwnbox-enterprise-cyber-training</guid>
            </item>
                    <item>
                <title>Your SOC vs. Reality: Why attackers are winning (and how Threat Range levels the battlefield)</title>
                <link>https://www.hackthebox.com/blog/threat-range-scenario-soc-readiness-ctem</link>
                <description>Sharpen SOC and DFIR readiness with Threat Range. See how real attacker tradecraft, CTEM alignment, and measurable performance metrics prepare teams for today’s breaches.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pYeON28GVB7h4HgGo6g00ZdiTYy8eWLC.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 19 Dec 2025 14:21:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/threat-range-scenario-soc-readiness-ctem</guid>
            </item>
                    <item>
                <title>Eek, a GodRAT: A step-by-step breakdown of a financial sector attack</title>
                <link>https://www.hackthebox.com/blog/godrat-financial-sector-attack-analysis</link>
                <description>A deep dive into GodRAT’s financial sector intrusion, mapping its attack chain, steganographic loaders, and RAT techniques to MITRE ATT&amp;CK and real-world defenses.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/cgN7irlBrLBnp5NStJXuPsOGr7cd0J6O.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 18 Dec 2025 17:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/godrat-financial-sector-attack-analysis</guid>
            </item>
                    <item>
                <title>How to turn exposure data into real-world cyber readiness: 7 key takeaways from our webinar</title>
                <link>https://www.hackthebox.com/blog/turn-exposure-data-into-cyber-readiness-7-key-takeaways-threat-range</link>
                <description>Discover 7 key takeaways from our webinar on turning exposure data into real-world cyber readiness with Threat Range, our team-based simulation platform.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/2PCEYf4K03TjY9GEti13v6aicZsoZq1I.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 17 Dec 2025 12:01:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/turn-exposure-data-into-cyber-readiness-7-key-takeaways-threat-range</guid>
            </item>
                    <item>
                <title>HTB CPTS gains FedRAMP authorized provider status</title>
                <link>https://www.hackthebox.com/blog/penetration-tester-fedramp</link>
                <description>HTB continues to gain traction as a go-to certification for cybersecurity professionals working in or with the U.S. government.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/lmxIVn8IKS8ghVPUU8KJYV48zSQ3YQIU.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 11 Dec 2025 05:02:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/penetration-tester-fedramp</guid>
            </item>
                    <item>
                <title>S.OLIVER GROUP accelerates cybersecurity decision-making by 30% with HTB</title>
                <link>https://www.hackthebox.com/blog/s-oliver</link>
                <description>Learn how S.OLIVER GROUP identifies issues faster, interprets technical signals more confidently, and makes clearer, more targeted decisions during security-critical moments.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/VokfoFXvcvv2qGitvQauhKguRDQMnUbM.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 11 Dec 2025 02:16:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/s-oliver</guid>
            </item>
                    <item>
                <title>CVE-2025-55182—The React2Shell vulnerability you need to patch right now</title>
                <link>https://www.hackthebox.com/blog/react2shell-cve-2025-55182-threat-spotlight</link>
                <description>A deep dive into React2Shell (CVE-2025-55182), the critical remote code execution vulnerability affecting React Server Components and Next.js.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/5E1tQpSQiUUhfIJ7dv0LNBJSySp38A7n.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 10 Dec 2025 12:01:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/react2shell-cve-2025-55182-threat-spotlight</guid>
            </item>
                    <item>
                <title>How to operationalize the OWASP LLM top 10 and (actually) secure GenAI apps</title>
                <link>https://www.hackthebox.com/blog/operationalizing-owasp-llm-top-10-llm-security-controls</link>
                <description>Deploying LLMs without chaos means treating the OWASP LLM Top 10 like an engineering spec. Learn how to turn each risk into real controls, harden pipelines, and secure GenAI apps.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/ziAxZtWxBxgDjBJklq3Qv5XQYEWT5Ovx.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 09 Dec 2025 16:21:46 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/operationalizing-owasp-llm-top-10-llm-security-controls</guid>
            </item>
            </channel>
</rss>
