FABRICKED: AMD Cloud Security Flaw Exposed, Is Your Data Safe?
Cloud servers that promise complete data protection are not as impenetrable as they seem. Researchers have found a way to bypass one of the main security technologies of AMD processors, without needin...
Frontier AI for Defenders: CrowdStrike and OpenAI TAC
CrowdStrike has been selected for OpenAI’sTrusted Access for Cyber (TAC) program. Today, OpenAI releasedGPT-5.4-Cyber, a frontier model designed for defensive cybersecurity, and expanded the TAC progr...
AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins’s Vision
With the boom in artificial intelligence, bold claims about breakthroughs in cybersecurity are becoming increasingly common, but not all experts are willing to accept them at face value. A new controv...
Harvest Now, Decrypt Later: risks to your data in the near future
The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy where encrypted data is collected today – despite being indecipherable – to decrypt in future when powerful quantum computers a...
From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?
Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified as ZDI-CAN-30207. The issue was discovered by Michael DeP...
Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch
There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the content is enough. Researchers from the Trend Micro Zero Day Initi...
The Click War: Pornhub and the Global Standoff Over Age Verification
The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this dispute is not the content itself, but the gateway to it. ...
Xi Jinping and the Chinese APT’s Ambition
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability
The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing in React’s serv...
2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
Latest news
Discover Quantum Computing
How CDNs can save your website: Speed and security at the highest level
Mathematics Meets Programming: A transformation journey
Scam Alert: How I Almost Fell for a Million-Dollar
HijackLoader Expands Techniques to Improve Defense Evasion
The Deception of the Wallet: A Journey into the World of Scammers
Signal towards the Future: Post Quantum Cryptography now protects our messages
Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!
RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company
Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility
The History of the Unix Operating System (Part 2)
The History of the UNIX operating system (Part 1)
The Reversal of the Brain Cipher Group after the Attack on Indonesia Terkoneksi
Pietro Melillo - July 3rd, 2024
Intel CPUs Vulnerable! New “Indirector” Attack Threatens Sensitive Data Detection.
Raffaela Crisci - July 3rd, 2024
Threat Actors Release 2022 Electronic Arts (EA) Employee Database
Pietro Melillo - July 2nd, 2024
OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk
Sandro Sana - July 2nd, 2024
Possible Data Breach of the Internal Security Operations Command (ISOC)
Pietro Melillo - July 1st, 2024
Bulgarian Hacker “Emil Külev” Arrested
Pietro Melillo - July 1st, 2024
Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!
Raffaela Crisci - July 1st, 2024
Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability
Pietro Melillo - July 1st, 2024
Allegedly Data Breach: Kemenkumham Email Credentials Compromised
Pietro Melillo - July 1st, 2024
Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users
Pietro Melillo - July 1st, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE










