Frontier AI for Defenders: CrowdStrike and OpenAI TAC
CrowdStrike has been selected for OpenAI’sTrusted Access for Cyber (TAC) program. Today, OpenAI releasedGPT-5.4-Cyber, a frontier model designed for defensive cybersecurity, and expanded the TAC progr...
AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins’s Vision
With the boom in artificial intelligence, bold claims about breakthroughs in cybersecurity are becoming increasingly common, but not all experts are willing to accept them at face value. A new controv...
Harvest Now, Decrypt Later: risks to your data in the near future
The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy where encrypted data is collected today – despite being indecipherable – to decrypt in future when powerful quantum computers a...
From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?
Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified as ZDI-CAN-30207. The issue was discovered by Michael DeP...
Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch
There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the content is enough. Researchers from the Trend Micro Zero Day Initi...
The Click War: Pornhub and the Global Standoff Over Age Verification
The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this dispute is not the content itself, but the gateway to it. ...
Xi Jinping and the Chinese APT’s Ambition
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability
The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing in React’s serv...
2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
Latest news
North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants
Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor
Famous hackers: the sad story of Jonathan James, aka c0mrade.
Famous Hackers: The Story of Gary McKinnon.
DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!
Cyberattacks on NFC contactless payments increase, new global threat
The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase
Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)
Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It
Cyber Security: CISA and NSA Recommend Secure Programming Languages
Apple and Google under pressure: German regulator wants to remove DeepSeek
Who are the most famous hackers in history?
Silvia Felici - July 8th, 2025
Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology
Sandro Sana - July 8th, 2025
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
Redazione RHC - July 8th, 2025
Human Replatforming! Artificial Intelligence Threatens Half of Jobs
Luca Vinciguerra - July 8th, 2025
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
Daniela Farina - July 7th, 2025
After Encrypting Half the World, Hunters International Shuts Down! Decryptor Distributed for Free
Pietro Melillo - July 4th, 2025
DarkForums Takes Over BreachForums’ Telegram Channel “The Jacuzzi”
Pietro Melillo - July 4th, 2025
Patch Chaos: Windows 11 Update Breaks PDF Printing
Luca Galuppi - July 3rd, 2025
North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
Redazione RHC - July 2nd, 2025
HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants
Redazione RHC - July 2nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE










