Skip to content
Red-Team News
The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI
Primary Menu
All News
Red-Team
Security Tools & Research
Exploitation
C2-Updates
CVE News
Bug Bounties & Responsible Disclosure
Blue-Team
APT-News
Security Tools & Research
Malware Analysis
SIEM & Detection Engineering
CVE News
Threat Intelligence
CVE News
Data Breaches
Cyber Laws & Regulations
Other
Search for:
Join The Newsletter
Latest Vulnerabilities
1
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
2
Critical Citrix NetScaler RCE Vulnerability Actively Exploited as Zero-Day
3
CISA Warns of Actively Exploited Git Code Execution Flaw in KEV Catalog
4
Critical Docker Desktop Vulnerability CVE-2025-9074 Enables Host Takeover
5
Apple’s 2025 Zero-Day Response: Sophisticated Attacks and Unprecedented Backporting
Google Issues Workarounds for ChromeOS Authentication Failures in Enterprise Environments
Blue-Team
Google Issues Workarounds for ChromeOS Authentication Failures in Enterprise Environments
Microsoft Word’s Cloud-Centric Default: Security Implications and Enterprise Management Challenges
News
Microsoft Word’s Cloud-Centric Default: Security Implications and Enterprise Management Challenges
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
CVE News
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
Global Law Enforcement Intensifies Crackdown on Cybercrime Enablers with VerifTools Takedown
Threat Intelligence
Global Law Enforcement Intensifies Crackdown on Cybercrime Enablers with VerifTools Takedown
Shadow IT: Quantifying the Unseen Attack Surface Expansion
Blue-Team
Shadow IT: Quantifying the Unseen Attack Surface Expansion
Latest
Popular
Google Issues Workarounds for ChromeOS Authentication Failures in Enterprise Environments
Google Issues Workarounds for ChromeOS Authentication Failures in Enterprise Environments
August 28, 2025
Microsoft Word’s Cloud-Centric Default: Security Implications and Enterprise Management Challenges
Microsoft Word’s Cloud-Centric Default: Security Implications and Enterprise Management Challenges
August 28, 2025
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
August 28, 2025
Global Law Enforcement Intensifies Crackdown on Cybercrime Enablers with VerifTools Takedown
Global Law Enforcement Intensifies Crackdown on Cybercrime Enablers with VerifTools Takedown
August 28, 2025
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
May 2, 2025
3
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
April 3, 2025
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
March 21, 2025
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
March 22, 2025
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
CVE News
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
August 28, 2025
Critical Citrix NetScaler RCE Vulnerability Actively Exploited as Zero-Day
CVE News
Critical Citrix NetScaler RCE Vulnerability Actively Exploited as Zero-Day
August 26, 2025
Data Breaches
Healthcare Services Group Breach: A Technical Analysis of the Underground Ransomware Attack
Data Breach
Healthcare Services Group Breach: A Technical Analysis of the Underground Ransomware Attack
August 27, 2025
Nevada Cyberattack: A Case Study in State Government Disruption
Data Breach
Nevada Cyberattack: A Case Study in State Government Disruption
August 26, 2025
The Panama Playlists Incident: A Technical Analysis of Data Scraping and Privacy Defaults
Data Breach
The Panama Playlists Incident: A Technical Analysis of Data Scraping and Privacy Defaults
August 24, 2025
Orange Belgium Data Breach: Technical Analysis of 850,000 Customer Records Exfiltrated
Data Breach
Orange Belgium Data Breach: Technical Analysis of 850,000 Customer Records Exfiltrated
August 21, 2025
Red Team
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
August 28, 2025
Critical Citrix NetScaler RCE Vulnerability Actively Exploited as Zero-Day
Critical Citrix NetScaler RCE Vulnerability Actively Exploited as Zero-Day
August 26, 2025
CISA Warns of Actively Exploited Git Code Execution Flaw in KEV Catalog
CISA Warns of Actively Exploited Git Code Execution Flaw in KEV Catalog
August 26, 2025
Blue Team
Google Issues Workarounds for ChromeOS Authentication Failures in Enterprise Environments
Google Issues Workarounds for ChromeOS Authentication Failures in Enterprise Environments
August 28, 2025
Shadow IT: Quantifying the Unseen Attack Surface Expansion
Shadow IT: Quantifying the Unseen Attack Surface Expansion
August 28, 2025
Analysis of PromptLock: The First AI-Powered Ransomware Proof-of-Concept
Analysis of PromptLock: The First AI-Powered Ransomware Proof-of-Concept
August 27, 2025
Threat Intelligence
Expansion of Chinese Cyber Campaigns Targets Global Telecommunications and Critical Infrastructure
Expansion of Chinese Cyber Campaigns Targets Global Telecommunications and Critical Infrastructure
August 27, 2025
Murky Panda APT Exploits Cloud Trust Relationships in Downstream Attacks
Murky Panda APT Exploits Cloud Trust Relationships in Downstream Attacks
August 22, 2025
APT36 Expands Linux Targeting with Malicious .desktop Files and ClickFix Social Engineering
APT36 Expands Linux Targeting with Malicious .desktop Files and ClickFix Social Engineering
August 22, 2025
You may have missed
Google Issues Workarounds for ChromeOS Authentication Failures in Enterprise Environments
Blue-Team
Google Issues Workarounds for ChromeOS Authentication Failures in Enterprise Environments
August 28, 2025
Microsoft Word’s Cloud-Centric Default: Security Implications and Enterprise Management Challenges
News
Microsoft Word’s Cloud-Centric Default: Security Implications and Enterprise Management Challenges
August 28, 2025
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
CVE News
Passwordstate Authentication Bypass: A History of High-Severity Flaws and Hardening
August 28, 2025
Global Law Enforcement Intensifies Crackdown on Cybercrime Enablers with VerifTools Takedown
Threat Intelligence
Global Law Enforcement Intensifies Crackdown on Cybercrime Enablers with VerifTools Takedown
August 28, 2025