Skip to content

Red-Team News

The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI

  • All News
  • Red-Team
    • Security Tools & Research
    • Exploitation
    • C2-Updates
    • CVE News
    • Bug Bounties & Responsible Disclosure
  • Blue-Team
    • APT-News
    • Security Tools & Research
    • Malware Analysis
    • SIEM & Detection Engineering
    • CVE News
  • Threat Intelligence
    • CVE News
    • Data Breaches
  • Cyber Laws & Regulations
  • Other
Join The Newsletter
Latest Vulnerabilities
1 security-protection-anti-virus-software-60504.jpeg.jpeg Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover 2 pexels-photo-132774.jpeg.jpeg Google Chrome’s Seventh Zero-Day of 2025 Patched in Emergency Update 3 pexels-photo-5240547.jpeg.jpeg RondoDox Botnet Exploits Critical XWiki Vulnerability in Widespread Campaign 4 pexels-photo-442150.jpeg.jpeg ASUS DSL Router Critical Authentication Bypass: CVE-2025-59367 Analysis and Mitigation 5 pexels-photo-546819.jpeg.jpeg Triofox Antivirus Feature Abused for SYSTEM-Level Code Execution
Investigating Qilin Ransomware Through Limited Endpoint Visibility
  • Blue-Team

Investigating Qilin Ransomware Through Limited Endpoint Visibility

The Fate of Google’s Ad Tech Monopoly: A Legal and Technical Precedent
  • Cyber Laws & Regulations

The Fate of Google’s Ad Tech Monopoly: A Legal and Technical Precedent

Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover
  • CVE News

Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

FCC Reverses Mandatory Telecom Cybersecurity Rules Following Salt Typhoon Hack
  • Cyber Laws & Regulations

FCC Reverses Mandatory Telecom Cybersecurity Rules Following Salt Typhoon Hack

Avast Scam Guardian: A Technical Analysis of AI-Powered Scam Defense
  • Threat Intelligence

Avast Scam Guardian: A Technical Analysis of AI-Powered Scam Defense

  • Latest
  • Popular
  • Investigating Qilin Ransomware Through Limited Endpoint Visibility

    Investigating Qilin Ransomware Through Limited Endpoint Visibility

    November 22, 2025
  • The Fate of Google’s Ad Tech Monopoly: A Legal and Technical Precedent

    The Fate of Google’s Ad Tech Monopoly: A Legal and Technical Precedent

    November 21, 2025
  • Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

    Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

    November 21, 2025
  • FCC Reverses Mandatory Telecom Cybersecurity Rules Following Salt Typhoon Hack

    FCC Reverses Mandatory Telecom Cybersecurity Rules Following Salt Typhoon Hack

    November 21, 2025
  • Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework

    Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework

    May 2, 2025 3
  • Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint

    Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint

    April 3, 2025
  • CVE-2025-29927 – Next.js Authorization Bypass in Middleware

    CVE-2025-29927 – Next.js Authorization Bypass in Middleware

    March 21, 2025
  • Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping…. Fig. 1 – A screenshot showing the results of Get-InjectedThreadEx scanning a process into which a 4.11 Beacon has just been injected.

    Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….

    March 22, 2025
Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover
  • CVE News

Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

November 21, 2025
Google Chrome’s Seventh Zero-Day of 2025 Patched in Emergency Update
  • CVE News

Google Chrome’s Seventh Zero-Day of 2025 Patched in Emergency Update

November 18, 2025

Data Breaches

Eurofiber France Breach: A Supply Chain Compromise Through Outdated GLPI
  • Data Breach

Eurofiber France Breach: A Supply Chain Compromise Through Outdated GLPI

November 17, 2025
London Nursery Ransomware Attack: Arrests Made Following Child Data Doxing
  • Data Breach

London Nursery Ransomware Attack: Arrests Made Following Child Data Doxing

October 8, 2025
Discord Third-Party Breach Exposes User Data and Scanned IDs
  • Data Breach

Discord Third-Party Breach Exposes User Data and Scanned IDs

October 4, 2025
Renault-Dacia UK Data Breach: Third-Party Vendor Incident Exposes Customer PII
  • Data Breach

Renault-Dacia UK Data Breach: Third-Party Vendor Incident Exposes Customer PII

October 3, 2025

Red Team

Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

November 21, 2025
Google Chrome’s Seventh Zero-Day of 2025 Patched in Emergency Update

Google Chrome’s Seventh Zero-Day of 2025 Patched in Emergency Update

November 18, 2025
RondoDox Botnet Exploits Critical XWiki Vulnerability in Widespread Campaign

RondoDox Botnet Exploits Critical XWiki Vulnerability in Widespread Campaign

November 17, 2025

Blue Team

Investigating Qilin Ransomware Through Limited Endpoint Visibility

Investigating Qilin Ransomware Through Limited Endpoint Visibility

November 22, 2025
The Hidden Risks in Your DevOps Stack: A Technical Analysis of Supply Chain, Identity, and Recovery Threats

The Hidden Risks in Your DevOps Stack: A Technical Analysis of Supply Chain, Identity, and Recovery Threats

November 19, 2025
Native Sysmon Integration in Windows 11 and Server 2025: A New Era for Endpoint Visibility

Native Sysmon Integration in Windows 11 and Server 2025: A New Era for Endpoint Visibility

November 18, 2025

Threat Intelligence

PlushDaemon APT Group Hijacks Software Updates in Sophisticated Supply-Chain Attacks

PlushDaemon APT Group Hijacks Software Updates in Sophisticated Supply-Chain Attacks

November 19, 2025
North Korean IT Worker Scheme: A Technical Analysis of Infiltration and Fraud

North Korean IT Worker Scheme: A Technical Analysis of Infiltration and Fraud

November 14, 2025
North Korean Cyber Operations: A Record-Breaking Year in Cryptocurrency Theft

North Korean Cyber Operations: A Record-Breaking Year in Cryptocurrency Theft

October 7, 2025

You may have missed

Investigating Qilin Ransomware Through Limited Endpoint Visibility
  • Blue-Team

Investigating Qilin Ransomware Through Limited Endpoint Visibility

November 22, 2025
The Fate of Google’s Ad Tech Monopoly: A Legal and Technical Precedent
  • Cyber Laws & Regulations

The Fate of Google’s Ad Tech Monopoly: A Legal and Technical Precedent

November 21, 2025
Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover
  • CVE News

Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

November 21, 2025
FCC Reverses Mandatory Telecom Cybersecurity Rules Following Salt Typhoon Hack
  • Cyber Laws & Regulations

FCC Reverses Mandatory Telecom Cybersecurity Rules Following Salt Typhoon Hack

November 21, 2025
Copyright © All rights reserved.