Skip to content

Red-Team News

The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI

  • All News
  • Red-Team
    • Security Tools & Research
    • Exploitation
    • C2-Updates
    • CVE News
    • Bug Bounties & Responsible Disclosure
  • Blue-Team
    • APT-News
    • Security Tools & Research
    • Malware Analysis
    • SIEM & Detection Engineering
    • CVE News
  • Threat Intelligence
    • CVE News
    • Data Breaches
  • Cyber Laws & Regulations
  • Other
Join The Newsletter
Latest Vulnerabilities
1 pexels-photo-8090132.jpeg.jpeg ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software 2 security-protection-anti-virus-software-60504.jpeg.jpeg Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover 3 pexels-photo-132774.jpeg.jpeg Google Chrome’s Seventh Zero-Day of 2025 Patched in Emergency Update 4 pexels-photo-5240547.jpeg.jpeg RondoDox Botnet Exploits Critical XWiki Vulnerability in Widespread Campaign 5 pexels-photo-442150.jpeg.jpeg ASUS DSL Router Critical Authentication Bypass: CVE-2025-59367 Analysis and Mitigation
NordVPN’s 2025 Black Friday Deal: A Technical Analysis of Plan Features for Security Professionals
  • News

NordVPN’s 2025 Black Friday Deal: A Technical Analysis of Plan Features for Security Professionals

Supply Chain Cyberattack Disrupts IT Systems Across Multiple London Councils
  • News

Supply Chain Cyberattack Disrupts IT Systems Across Multiple London Councils

ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software
  • CVE News

ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software

The AI Regulation War: How Super PACs Are Shaping the Future of Artificial Intelligence Governance
  • Cyber Laws & Regulations

The AI Regulation War: How Super PACs Are Shaping the Future of Artificial Intelligence Governance

OnSolve CodeRED Cyberattack: Systemic Failure in Critical Public Safety Infrastructure
  • Data Breach

OnSolve CodeRED Cyberattack: Systemic Failure in Critical Public Safety Infrastructure

  • Latest
  • Popular
  • NordVPN’s 2025 Black Friday Deal: A Technical Analysis of Plan Features for Security Professionals

    NordVPN’s 2025 Black Friday Deal: A Technical Analysis of Plan Features for Security Professionals

    November 26, 2025
  • Supply Chain Cyberattack Disrupts IT Systems Across Multiple London Councils

    Supply Chain Cyberattack Disrupts IT Systems Across Multiple London Councils

    November 26, 2025
  • ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software

    ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software

    November 26, 2025
  • The AI Regulation War: How Super PACs Are Shaping the Future of Artificial Intelligence Governance

    The AI Regulation War: How Super PACs Are Shaping the Future of Artificial Intelligence Governance

    November 26, 2025
  • Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework

    Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework

    May 2, 2025 3
  • Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint

    Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint

    April 3, 2025
  • CVE-2025-29927 – Next.js Authorization Bypass in Middleware

    CVE-2025-29927 – Next.js Authorization Bypass in Middleware

    March 21, 2025
  • Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping…. Fig. 1 – A screenshot showing the results of Get-InjectedThreadEx scanning a process into which a 4.11 Beacon has just been injected.

    Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….

    March 22, 2025
ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software
  • CVE News

ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software

November 26, 2025
Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover
  • CVE News

Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

November 21, 2025

Data Breaches

OnSolve CodeRED Cyberattack: Systemic Failure in Critical Public Safety Infrastructure
  • Data Breach

OnSolve CodeRED Cyberattack: Systemic Failure in Critical Public Safety Infrastructure

November 25, 2025
SitusAMC Data Breach Exposes Banking Client Information, Triggers FBI Investigation
  • Data Breach

SitusAMC Data Breach Exposes Banking Client Information, Triggers FBI Investigation

November 24, 2025
Harvard University Data Breach: Vishing Attack Compromises Alumni and Donor Database
  • Data Breach

Harvard University Data Breach: Vishing Attack Compromises Alumni and Donor Database

November 24, 2025
Eurofiber France Breach: A Supply Chain Compromise Through Outdated GLPI
  • Data Breach

Eurofiber France Breach: A Supply Chain Compromise Through Outdated GLPI

November 17, 2025

Red Team

ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software

ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software

November 26, 2025
Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

Grafana Enterprise Critical SCIM Vulnerability Enables Full Administrative Takeover

November 21, 2025
Google Chrome’s Seventh Zero-Day of 2025 Patched in Emergency Update

Google Chrome’s Seventh Zero-Day of 2025 Patched in Emergency Update

November 18, 2025

Blue Team

Microsoft Retires Legacy WINS Service, Final Support Ends in 2034

Microsoft Retires Legacy WINS Service, Final Support Ends in 2034

November 24, 2025
Windows 11 24H2 Shell Instability: A Technical Analysis of Critical System Crashes

Windows 11 24H2 Shell Instability: A Technical Analysis of Critical System Crashes

November 24, 2025
Investigating Qilin Ransomware Through Limited Endpoint Visibility

Investigating Qilin Ransomware Through Limited Endpoint Visibility

November 22, 2025

Threat Intelligence

PlushDaemon APT Group Hijacks Software Updates in Sophisticated Supply-Chain Attacks

PlushDaemon APT Group Hijacks Software Updates in Sophisticated Supply-Chain Attacks

November 19, 2025
North Korean IT Worker Scheme: A Technical Analysis of Infiltration and Fraud

North Korean IT Worker Scheme: A Technical Analysis of Infiltration and Fraud

November 14, 2025
North Korean Cyber Operations: A Record-Breaking Year in Cryptocurrency Theft

North Korean Cyber Operations: A Record-Breaking Year in Cryptocurrency Theft

October 7, 2025

You may have missed

NordVPN’s 2025 Black Friday Deal: A Technical Analysis of Plan Features for Security Professionals
  • News

NordVPN’s 2025 Black Friday Deal: A Technical Analysis of Plan Features for Security Professionals

November 26, 2025
Supply Chain Cyberattack Disrupts IT Systems Across Multiple London Councils
  • News

Supply Chain Cyberattack Disrupts IT Systems Across Multiple London Councils

November 26, 2025
ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software
  • CVE News

ASUS Confronts Critical Authentication Bypass Flaws in Routers and PC Software

November 26, 2025
The AI Regulation War: How Super PACs Are Shaping the Future of Artificial Intelligence Governance
  • Cyber Laws & Regulations

The AI Regulation War: How Super PACs Are Shaping the Future of Artificial Intelligence Governance

November 26, 2025
Copyright © All rights reserved.