Skip to content
Red-Team News
The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI
Primary Menu
All News
Red-Team
Security Tools & Research
Exploitation
C2-Updates
CVE News
Bug Bounties & Responsible Disclosure
Blue-Team
APT-News
Security Tools & Research
Malware Analysis
SIEM & Detection Engineering
CVE News
Threat Intelligence
CVE News
Data Breaches
Cyber Laws & Regulations
Other
Search for:
Join The Newsletter
Latest Vulnerabilities
1
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
2
Cisco Patches Critical ISE and CCP Vulnerabilities with Public Exploits
3
Critical Authentication Bypass and RCE Vulnerabilities in HPE StoreOnce Software
4
Qualcomm Patches Actively Exploited Adreno GPU Zero-Day Vulnerabilities
5
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
1
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
2
Cisco Patches Critical ISE and CCP Vulnerabilities with Public Exploits
3
Critical Authentication Bypass and RCE Vulnerabilities in HPE StoreOnce Software
4
Qualcomm Patches Actively Exploited Adreno GPU Zero-Day Vulnerabilities
5
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
Securing Windows Services: Design Principles and Mitigation Strategies
Blue-Team
Securing Windows Services: Design Principles and Mitigation Strategies
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
CVE News
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
Destructive npm Packages Masquerading as Utilities Target Developer Environments
Red-Team
Destructive npm Packages Masquerading as Utilities Target Developer Environments
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
Blue-Team
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
Data Breach
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
Securing Windows Services: Design Principles and Mitigation Strategies
Blue-Team
Securing Windows Services: Design Principles and Mitigation Strategies
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
CVE News
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
Destructive npm Packages Masquerading as Utilities Target Developer Environments
Red-Team
Destructive npm Packages Masquerading as Utilities Target Developer Environments
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
Blue-Team
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
Data Breach
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
Securing Windows Services: Design Principles and Mitigation Strategies
Blue-Team
Securing Windows Services: Design Principles and Mitigation Strategies
Latest
Popular
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
June 8, 2025
Destructive npm Packages Masquerading as Utilities Target Developer Environments
Destructive npm Packages Masquerading as Utilities Target Developer Environments
June 7, 2025
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
June 6, 2025
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
June 5, 2025
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
May 2, 2025
3
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
April 3, 2025
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
March 21, 2025
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
March 22, 2025
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
CVE News
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
June 8, 2025
Destructive npm Packages Masquerading as Utilities Target Developer Environments
Red-Team
Destructive npm Packages Masquerading as Utilities Target Developer Environments
June 7, 2025
Data Breaches
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
Data Breach
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
June 5, 2025
International Law Enforcement Seizes BidenCash Dark Web Carding Market Domains
Data Breach
International Law Enforcement Seizes BidenCash Dark Web Carding Market Domains
June 4, 2025
Lee Enterprises Data Breach: Qilin Ransomware Attack Impacts 39,000 Individuals
Data Breach
Lee Enterprises Data Breach: Qilin Ransomware Attack Impacts 39,000 Individuals
June 4, 2025
Coinbase Data Breach: Bribed TaskUs Support Agents Leaked Sensitive User Data
Data Breach
Coinbase Data Breach: Bribed TaskUs Support Agents Leaked Sensitive User Data
June 3, 2025
Red Team
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
June 8, 2025
Destructive npm Packages Masquerading as Utilities Target Developer Environments
Destructive npm Packages Masquerading as Utilities Target Developer Environments
June 7, 2025
Cisco Patches Critical ISE and CCP Vulnerabilities with Public Exploits
Cisco Patches Critical ISE and CCP Vulnerabilities with Public Exploits
June 4, 2025
Blue Team
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
June 6, 2025
Securing Windows Services: Design Principles and Mitigation Strategies
Securing Windows Services: Design Principles and Mitigation Strategies
June 5, 2025
Attack Surface Mapping: How Adversaries Outpace Defenders and How to Respond
Attack Surface Mapping: How Adversaries Outpace Defenders and How to Respond
May 29, 2025
Threat Intelligence
ViLE Gang Members Sentenced for Federal Law Enforcement Portal Breach and Extortion Scheme
ViLE Gang Members Sentenced for Federal Law Enforcement Portal Breach and Extortion Scheme
June 5, 2025
US Offers $10M Reward for Intel on RedLine Malware-Linked State Hackers
US Offers $10M Reward for Intel on RedLine Malware-Linked State Hackers
June 5, 2025
Scattered Spider: Beyond the Headlines – Tactics, Targets, and Mitigations
Scattered Spider: Beyond the Headlines – Tactics, Targets, and Mitigations
June 3, 2025
You may have missed
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
CVE News
New Mirai Botnet Variant Exploits TBK DVR Devices via CVE-2024-3721
June 8, 2025
Destructive npm Packages Masquerading as Utilities Target Developer Environments
Red-Team
Destructive npm Packages Masquerading as Utilities Target Developer Environments
June 7, 2025
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
Blue-Team
Building a Malware-Resistant Windows Service: Core Strategies for Threat Prevention
June 6, 2025
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
Data Breach
Repackaged AT&T Data Leak Exposes 49M Users with Linked SSNs and Birthdates
June 5, 2025