Frontier AI for Defenders: CrowdStrike and OpenAI TAC
CrowdStrike has been selected for OpenAI’sTrusted Access for Cyber (TAC) program. Today, OpenAI releasedGPT-5.4-Cyber, a frontier model designed for defensive cybersecurity, and expanded the TAC progr...
AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins’s Vision
With the boom in artificial intelligence, bold claims about breakthroughs in cybersecurity are becoming increasingly common, but not all experts are willing to accept them at face value. A new controv...
Harvest Now, Decrypt Later: risks to your data in the near future
The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy where encrypted data is collected today – despite being indecipherable – to decrypt in future when powerful quantum computers a...
From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?
Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified as ZDI-CAN-30207. The issue was discovered by Michael DeP...
Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch
There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the content is enough. Researchers from the Trend Micro Zero Day Initi...
The Click War: Pornhub and the Global Standoff Over Age Verification
The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this dispute is not the content itself, but the gateway to it. ...
Xi Jinping and the Chinese APT’s Ambition
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability
The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing in React’s serv...
2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
Latest news
Latvian Government Database Compromised: Over 1.6 Million Government Data Lines!
Threat Actors Steal 5.90 GB of Sensitive Data from the Fiscalía General del Estado de Veracruz!
Dangerous 0day Windows LPE Vulnerability for Sale in the Underground
Europol Breached: Secret Documents for Sale on the Dark Web
The New RockYou2024 Collection has been published! 10 Billion Credentials Compromised
Taylor Swift’s Tour at Risk: Hacker Demands $2 Million from Ticketmaster for 170k Stolen Barcodes
Critical Apache Tomcat Vulnerability CVE-2024-34750 Could Bring Your Server to a Halt!
Threat Actors: Alleged Data Breach of Ukraine Traffic Police
Serious Vulnerability in Windows Systems: Here’s How an Attacker Can Gain Complete Control of Your PC
Medusa Ransomware claims responsibility for the attack on Harry Perkins Institute
A new potential data breach has exposed sensitive information of 70,000 users of the French amusement park Bol D’Air on BreachForum
Threat Actors Post Tennis Tournament Data Breach in Israel
Donald Trump’s campaign under attack! Documents and internal communications exfiltrated
Alessio Stefan - August 11th, 2024
NSO Group targeted! BlackMeta attacks Spyware maker’s central domain
Alessio Stefan - August 4th, 2024
Echelon Stealer: The Open Source Malware
Pietro Melillo - July 31st, 2024
Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages
Redazione RHC - July 29th, 2024
The Ransomware Group Ransomexx Claims Attack on Liteon
Pietro Melillo - July 26th, 2024
The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones
Carlo Di Dato - July 25th, 2024
RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”
RHC Dark Lab - July 25th, 2024
IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale
Raffaela Crisci - July 24th, 2024
Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”
Redazione RHC - July 24th, 2024
The other side of cybersecurity: stress and burnout are “by design” in domain experts
Redazione RHC - July 23rd, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE










