Harvest Now, Decrypt Later: risks to your data in the near future
The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy where encrypted data is collected today – despite being indecipherable – to decrypt in future when powerful quantum computers a...
From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?
Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified as ZDI-CAN-30207. The issue was discovered by Michael DeP...
Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch
There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the content is enough. Researchers from the Trend Micro Zero Day Initi...
The Click War: Pornhub and the Global Standoff Over Age Verification
The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this dispute is not the content itself, but the gateway to it. ...
Xi Jinping and the Chinese APT’s Ambition
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability
The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing in React’s serv...
2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”
In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: “Don’t worry, they’re on different VLANs.” It is a reassuring phrase, usually spoken in goo...
Cloud logs under threat? The method that exposes attackers early
You know that feeling when cloud alerts keep piling up and you’re left wondering whether it’s just background noise or something genuinely bad unfolding? Yeah, it happens all the time. Monitoring syst...
Latest news
The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
Alleged SpaceX Database Breach Published on BreachForums
RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”
Navigating the future: a dialogue on human resilience and preservation
Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.
Arrest of Pavel Durov: Telegram Founder Detained in Paris
IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management
Donald Trump’s campaign under attack! Documents and internal communications exfiltrated
NSO Group targeted! BlackMeta attacks Spyware maker’s central domain
Echelon Stealer: The Open Source Malware
Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages
Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future
Tara Lie - February 24th, 2025
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
RHC Dark Lab - February 20th, 2025
The UK’s Digital Crackdown: how the government is using our online habits to breach human rights
Ashleigh Crause - February 12th, 2025
The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
Alessio Stefan - January 8th, 2025
FBI responds to threats and announcement of LockBit 4.0
Alessio Stefan - December 22nd, 2024
Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data
Luca Stivali - December 4th, 2024
The Exploit for the RCE on Palo Alto Firewalls is now Online! And let the Administration be for all
Luca Stivali - December 3rd, 2024
RHC DarkLab Interviews Interlock Ransomware. “Don’t waste your energy and time. We will do it for you.”
RHC Dark Lab - December 2nd, 2024
How Threat Actor make EDR’s harmless with a reboot
Alex Necula - November 22nd, 2024
The Story Of Conti Ransomware – The War Within (Episode 2)
Alessio Stefan - November 22nd, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE










