Skip to content

Red-Team News

The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI

  • All News
  • Red-Team
    • Security Tools & Research
    • Exploitation
    • C2-Updates
    • CVE News
    • Bug Bounties & Responsible Disclosure
  • Blue-Team
    • APT-News
    • Security Tools & Research
    • Malware Analysis
    • SIEM & Detection Engineering
    • CVE News
  • Threat Intelligence
    • CVE News
    • Data Breaches
  • Cyber Laws & Regulations
  • Other
Join The Newsletter
Latest Vulnerabilities
1 pexels-photo-1.jpg-1.jpg-1 O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata 2 pexels-photo-5380589.jpeg.jpeg Microsoft Resolves Linux Boot Issues Caused by August 2024 Windows Security Updates 3 pexels-photo-7567497.jpeg.jpeg Ivanti EPMM Zero-Days Exploited in Chained Remote Code Execution Attacks 4 pexels-photo-30901563.jpeg.jpeg Microsoft May 2025 Patch Tuesday: 5 Exploited Zero-Days and 72 Flaws Addressed 5 pexels-photo-5243610.jpeg.jpeg Windows 11 KB5058411 and KB5058405 Updates: Security Fixes and Known Issues
1 pexels-photo-1.jpg-1.jpg-1 O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata 2 pexels-photo-5380589.jpeg.jpeg Microsoft Resolves Linux Boot Issues Caused by August 2024 Windows Security Updates 3 pexels-photo-7567497.jpeg.jpeg Ivanti EPMM Zero-Days Exploited in Chained Remote Code Execution Attacks 4 pexels-photo-30901563.jpeg.jpeg Microsoft May 2025 Patch Tuesday: 5 Exploited Zero-Days and 72 Flaws Addressed 5 pexels-photo-5243610.jpeg.jpeg Windows 11 KB5058411 and KB5058405 Updates: Security Fixes and Known Issues
Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
  • Threat Intelligence

Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
  • Data Breach

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise

Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
  • APT-News

Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains

RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
  • Malware Analysis

RVTools Supply Chain Attack Delivers Bumblebee Malware Loader

Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
  • Blue-Team

Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks

Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
  • Threat Intelligence

Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
  • Data Breach

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise

Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
  • APT-News

Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains

RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
  • Malware Analysis

RVTools Supply Chain Attack Delivers Bumblebee Malware Loader

Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
  • Blue-Team

Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks

Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
  • Threat Intelligence

Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies

  • Latest
  • Popular
  • SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise

    SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise

    May 20, 2025
  • Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains

    Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains

    May 20, 2025
  • RVTools Supply Chain Attack Delivers Bumblebee Malware Loader

    RVTools Supply Chain Attack Delivers Bumblebee Malware Loader

    May 20, 2025
  • Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks

    Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks

    May 20, 2025
  • Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework

    Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework

    May 2, 2025 3
  • Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint

    Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint

    April 3, 2025
  • CVE-2025-29927 – Next.js Authorization Bypass in Middleware

    CVE-2025-29927 – Next.js Authorization Bypass in Middleware

    March 21, 2025
  • Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping…. Fig. 1 – A screenshot showing the results of Get-InjectedThreadEx scanning a process into which a 4.11 Beacon has just been injected.

    Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….

    March 22, 2025
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
  • CVE News

O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata

May 19, 2025
Tor Oniux: Kernel-Level Network Anonymization for Linux Applications
  • Red-Team

Tor Oniux: Kernel-Level Network Anonymization for Linux Applications

May 15, 2025

Data Breaches

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
  • Data Breach

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise

May 20, 2025
Australian Human Rights Commission Data Breach: Technical Analysis and Impact
  • Data Breach

Australian Human Rights Commission Data Breach: Technical Analysis and Impact

May 14, 2025
Third-Party and Machine Credential Abuse: The Hidden Catalysts of 2025’s Major Breaches
  • Data Breach

Third-Party and Machine Credential Abuse: The Hidden Catalysts of 2025’s Major Breaches

May 6, 2025
xAI API Key Leak: Technical Breakdown and Security Implications
  • Data Breach

xAI API Key Leak: Technical Breakdown and Security Implications

May 6, 2025

Red Team

O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata

O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata

May 19, 2025
Tor Oniux: Kernel-Level Network Anonymization for Linux Applications

Tor Oniux: Kernel-Level Network Anonymization for Linux Applications

May 15, 2025
Microsoft Resolves Linux Boot Issues Caused by August 2024 Windows Security Updates

Microsoft Resolves Linux Boot Issues Caused by August 2024 Windows Security Updates

May 14, 2025

Blue Team

RVTools Supply Chain Attack Delivers Bumblebee Malware Loader

RVTools Supply Chain Attack Delivers Bumblebee Malware Loader

May 20, 2025
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks

Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks

May 20, 2025
Procolored Printer Drivers Distributed Malware for Six Months: Technical Analysis and Mitigation

Procolored Printer Drivers Distributed Malware for Six Months: Technical Analysis and Mitigation

May 16, 2025

Threat Intelligence

Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains

Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains

May 20, 2025
Arla Foods Cyberattack: Ransomware Disrupts Dairy Production and Supply Chains

Arla Foods Cyberattack: Ransomware Disrupts Dairy Production and Supply Chains

May 19, 2025
Apple’s AI Partnership with Alibaba Sparks U.S. National Security Concerns

Apple’s AI Partnership with Alibaba Sparks U.S. National Security Concerns

May 18, 2025

You may have missed

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
  • Data Breach

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise

May 20, 2025
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
  • APT-News

Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains

May 20, 2025
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
  • Malware Analysis

RVTools Supply Chain Attack Delivers Bumblebee Malware Loader

May 20, 2025
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
  • Blue-Team

Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks

May 20, 2025
Copyright © All rights reserved.