
US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes
On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack
London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its

Stormous claims an attack on NASA
In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total

Alleged SpaceX Database Breach Published on BreachForums
A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed

How Threat Actor make EDR’s harmless with a reboot
Alex Necula - November 22nd, 2024
I became aware of this technique like 9 months ago, and now I see this on a attack in the wild conducted by Qilin Ransomware Gang, so it’s time to...

The Story Of Conti Ransomware – The War Within (Episode 2)
Alessio Stefan - November 22nd, 2024
This is a continuation of the Conti story. You can read the previous part, which covered the group's origins, in the previous article. We will now explore the internal components...

IntelBroker Claims Tesla Charging Database Breach
Redazione RHC - November 20th, 2024
Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims that Tesla’s charging station database has been compromised and made...

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime
Olivia Terragni - November 11th, 2024
Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that "is no longer limited to reactive post-incident analysis but has evolved towards a...
Sign up for the newsletter