Skip to content
Red-Team News
The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI
Primary Menu
All News
Red-Team
Security Tools & Research
Exploitation
C2-Updates
CVE News
Bug Bounties & Responsible Disclosure
Blue-Team
APT-News
Security Tools & Research
Malware Analysis
SIEM & Detection Engineering
CVE News
Threat Intelligence
CVE News
Data Breaches
Cyber Laws & Regulations
Other
Search for:
Join The Newsletter
Latest Vulnerabilities
1
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
2
Microsoft Resolves Linux Boot Issues Caused by August 2024 Windows Security Updates
3
Ivanti EPMM Zero-Days Exploited in Chained Remote Code Execution Attacks
4
Microsoft May 2025 Patch Tuesday: 5 Exploited Zero-Days and 72 Flaws Addressed
5
Windows 11 KB5058411 and KB5058405 Updates: Security Fixes and Known Issues
1
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
2
Microsoft Resolves Linux Boot Issues Caused by August 2024 Windows Security Updates
3
Ivanti EPMM Zero-Days Exploited in Chained Remote Code Execution Attacks
4
Microsoft May 2025 Patch Tuesday: 5 Exploited Zero-Days and 72 Flaws Addressed
5
Windows 11 KB5058411 and KB5058405 Updates: Security Fixes and Known Issues
Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
Threat Intelligence
Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
Data Breach
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
APT-News
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
Malware Analysis
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
Blue-Team
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
Threat Intelligence
Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
Data Breach
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
APT-News
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
Malware Analysis
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
Blue-Team
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
Threat Intelligence
Banking Sector Cybersecurity: HSBC CEO Highlights Rising Threats and Mitigation Strategies
Latest
Popular
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
May 20, 2025
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
May 20, 2025
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
May 20, 2025
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
May 20, 2025
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
May 2, 2025
3
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
April 3, 2025
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
March 21, 2025
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
March 22, 2025
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
CVE News
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
May 19, 2025
Tor Oniux: Kernel-Level Network Anonymization for Linux Applications
Red-Team
Tor Oniux: Kernel-Level Network Anonymization for Linux Applications
May 15, 2025
Data Breaches
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
Data Breach
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
May 20, 2025
Australian Human Rights Commission Data Breach: Technical Analysis and Impact
Data Breach
Australian Human Rights Commission Data Breach: Technical Analysis and Impact
May 14, 2025
Third-Party and Machine Credential Abuse: The Hidden Catalysts of 2025’s Major Breaches
Data Breach
Third-Party and Machine Credential Abuse: The Hidden Catalysts of 2025’s Major Breaches
May 6, 2025
xAI API Key Leak: Technical Breakdown and Security Implications
Data Breach
xAI API Key Leak: Technical Breakdown and Security Implications
May 6, 2025
Red Team
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
May 19, 2025
Tor Oniux: Kernel-Level Network Anonymization for Linux Applications
Tor Oniux: Kernel-Level Network Anonymization for Linux Applications
May 15, 2025
Microsoft Resolves Linux Boot Issues Caused by August 2024 Windows Security Updates
Microsoft Resolves Linux Boot Issues Caused by August 2024 Windows Security Updates
May 14, 2025
Blue Team
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
May 20, 2025
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
May 20, 2025
Procolored Printer Drivers Distributed Malware for Six Months: Technical Analysis and Mitigation
Procolored Printer Drivers Distributed Malware for Six Months: Technical Analysis and Mitigation
May 16, 2025
Threat Intelligence
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
May 20, 2025
Arla Foods Cyberattack: Ransomware Disrupts Dairy Production and Supply Chains
Arla Foods Cyberattack: Ransomware Disrupts Dairy Production and Supply Chains
May 19, 2025
Apple’s AI Partnership with Alibaba Sparks U.S. National Security Concerns
Apple’s AI Partnership with Alibaba Sparks U.S. National Security Concerns
May 18, 2025
You may have missed
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
Data Breach
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
May 20, 2025
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
APT-News
Hazy Hawk Gang Exploits DNS Misconfigurations to Hijack Trusted Domains
May 20, 2025
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
Malware Analysis
RVTools Supply Chain Attack Delivers Bumblebee Malware Loader
May 20, 2025
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
Blue-Team
Service Desk Security: Mitigating Social Engineering and MFA Bypass Attacks
May 20, 2025