Skip to content
Red-Team News
The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI
Primary Menu
All News
Red-Team
Security Tools & Research
Exploitation
C2-Updates
CVE News
Bug Bounties & Responsible Disclosure
Blue-Team
APT-News
Security Tools & Research
Malware Analysis
SIEM & Detection Engineering
CVE News
Threat Intelligence
CVE News
Data Breaches
Cyber Laws & Regulations
Other
Search for:
Join The Newsletter
Latest Vulnerabilities
1
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
2
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
3
Critical Unpatched Vulnerabilities in Versa Concerto Expose Systems to Auth Bypass and RCE
4
Critical SAMLify SSO Vulnerability Enables Admin Impersonation via Signature Wrapping
5
Critical Privilege Escalation Vulnerability in WordPress Motors Theme (CVE-2025-4322)
1
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
2
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
3
Critical Unpatched Vulnerabilities in Versa Concerto Expose Systems to Auth Bypass and RCE
4
Critical SAMLify SSO Vulnerability Enables Admin Impersonation via Signature Wrapping
5
Critical Privilege Escalation Vulnerability in WordPress Motors Theme (CVE-2025-4322)
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
APT-News
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
CVE News
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
APT-News
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
The Legal and Technical Implications of Forcing Google to Share Search Data
Cyber Laws & Regulations
The Legal and Technical Implications of Forcing Google to Share Search Data
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
News
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
APT-News
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
CVE News
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
APT-News
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
The Legal and Technical Implications of Forcing Google to Share Search Data
Cyber Laws & Regulations
The Legal and Technical Implications of Forcing Google to Share Search Data
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
News
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
APT-News
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
Latest
Popular
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
May 31, 2025
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
May 30, 2025
The Legal and Technical Implications of Forcing Google to Share Search Data
The Legal and Technical Implications of Forcing Google to Share Search Data
May 30, 2025
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
May 30, 2025
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
May 2, 2025
3
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
April 3, 2025
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
March 21, 2025
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
March 22, 2025
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
CVE News
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
May 31, 2025
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
CVE News
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
May 29, 2025
Data Breaches
Victoria’s Secret Cybersecurity Incident: Analysis and Implications for Enterprise Security
Data Breach
Victoria’s Secret Cybersecurity Incident: Analysis and Implications for Enterprise Security
May 29, 2025
Adidas Data Breach: Third-Party Provider Hack Exposes Customer Contact Data
Data Breach
Adidas Data Breach: Third-Party Provider Hack Exposes Customer Contact Data
May 27, 2025
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
Data Breach
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
May 20, 2025
Australian Human Rights Commission Data Breach: Technical Analysis and Impact
Data Breach
Australian Human Rights Commission Data Breach: Technical Analysis and Impact
May 14, 2025
Red Team
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
May 31, 2025
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
May 29, 2025
PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing
PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing
May 28, 2025
Blue Team
Attack Surface Mapping: How Adversaries Outpace Defenders and How to Respond
Attack Surface Mapping: How Adversaries Outpace Defenders and How to Respond
May 29, 2025
Prioritizing Exploitable Vulnerabilities: Cutting Through the Noise of CVSS Scores
Prioritizing Exploitable Vulnerabilities: Cutting Through the Noise of CVSS Scores
May 27, 2025
ThreatLocker’s Zero Trust Patch Management: Closing Vulnerability Windows at Scale
ThreatLocker’s Zero Trust Patch Management: Closing Vulnerability Windows at Scale
May 21, 2025
Threat Intelligence
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
May 30, 2025
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
May 29, 2025
DragonForce Ransomware Exploits SimpleHelp RMM in MSP Supply Chain Attacks
DragonForce Ransomware Exploits SimpleHelp RMM in MSP Supply Chain Attacks
May 27, 2025
You may have missed
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
CVE News
Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
May 31, 2025
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
APT-News
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
May 30, 2025
The Legal and Technical Implications of Forcing Google to Share Search Data
Cyber Laws & Regulations
The Legal and Technical Implications of Forcing Google to Share Search Data
May 30, 2025
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
News
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
May 30, 2025