Frontier AI for Defenders: CrowdStrike and OpenAI TAC
CrowdStrike has been selected for OpenAI’sTrusted Access for Cyber (TAC) program. Today, OpenAI releasedGPT-5.4-Cyber, a frontier model designed for defensive cybersecurity, and expanded the TAC progr...
AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins’s Vision
With the boom in artificial intelligence, bold claims about breakthroughs in cybersecurity are becoming increasingly common, but not all experts are willing to accept them at face value. A new controv...
Harvest Now, Decrypt Later: risks to your data in the near future
The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy where encrypted data is collected today – despite being indecipherable – to decrypt in future when powerful quantum computers a...
From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?
Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified as ZDI-CAN-30207. The issue was discovered by Michael DeP...
Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch
There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the content is enough. Researchers from the Trend Micro Zero Day Initi...
The Click War: Pornhub and the Global Standoff Over Age Verification
The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this dispute is not the content itself, but the gateway to it. ...
Xi Jinping and the Chinese APT’s Ambition
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability
The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing in React’s serv...
2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026
In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire worl...
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”
Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical pl...
Latest news
NightSpire: A New Player in the Ransomware Landscape
Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Akira Ransomware: The New Threat Using Webcams as Entry Points
Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
Analysis of Recorded Future’s CVE Report – February 2025
Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
The UK’s Digital Crackdown: how the government is using our online habits to breach human rights
The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
FBI responds to threats and announcement of LockBit 4.0
Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data
Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain
Daniela Farina - June 23rd, 2025
Connected and Vulnerable: How to Secure OT and ICS in 2025
Redazione RHC - June 22nd, 2025
Smart TV or Living Room Spies? Here’s How They’re Monitoring You
Redazione RHC - June 22nd, 2025
Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone
Redazione RHC - June 22nd, 2025
ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay
Redazione RHC - June 22nd, 2025
AKIRA emergency report: the ransomware that is breaching Italy
RHC Dark Lab - June 22nd, 2025
Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia
Sandro Sana - June 11th, 2025
RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series
RHC Dark Lab - June 2nd, 2025
Bringing Your Imagination to Life: AI-Generated Images from Your Description
Ashleigh Crause - May 14th, 2025
Why Europe’s healthcare sector must build resilience to fight the threat of ransomware
Olivia Terragni - April 13th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE










