Skip to content

Red-Team News

The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI

  • All News
  • Red-Team
    • Security Tools & Research
    • Exploitation
    • C2-Updates
    • CVE News
    • Bug Bounties & Responsible Disclosure
  • Blue-Team
    • APT-News
    • Security Tools & Research
    • Malware Analysis
    • SIEM & Detection Engineering
    • CVE News
  • Threat Intelligence
    • CVE News
    • Data Breaches
  • Cyber Laws & Regulations
  • Other
Join The Newsletter
Latest Vulnerabilities
1 pexels-photo-2882659.jpeg.jpeg-1 Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation 2 pexels-photo-1138735.jpeg.jpeg Critical Unpatched Vulnerabilities in Versa Concerto Expose Systems to Auth Bypass and RCE 3 pexels-photo-4238498.jpeg.jpeg Critical SAMLify SSO Vulnerability Enables Admin Impersonation via Signature Wrapping 4 pexels-photo-6963062.jpeg.jpeg Critical Privilege Escalation Vulnerability in WordPress Motors Theme (CVE-2025-4322) 5 pexels-photo-1.jpg-1.jpg-1 O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
1 pexels-photo-2882659.jpeg.jpeg-1 Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation 2 pexels-photo-1138735.jpeg.jpeg Critical Unpatched Vulnerabilities in Versa Concerto Expose Systems to Auth Bypass and RCE 3 pexels-photo-4238498.jpeg.jpeg Critical SAMLify SSO Vulnerability Enables Admin Impersonation via Signature Wrapping 4 pexels-photo-6963062.jpeg.jpeg Critical Privilege Escalation Vulnerability in WordPress Motors Theme (CVE-2025-4322) 5 pexels-photo-1.jpg-1.jpg-1 O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
  • CVE News

Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation

The Legal and Technical Implications of Forcing Google to Share Search Data
  • Cyber Laws & Regulations

The Legal and Technical Implications of Forcing Google to Share Search Data

Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
  • News

Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications

ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
  • APT-News

ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation

Google Apps Script Exploited in Sophisticated Phishing Campaigns
  • Threat Intelligence

Google Apps Script Exploited in Sophisticated Phishing Campaigns

Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
  • CVE News

Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation

The Legal and Technical Implications of Forcing Google to Share Search Data
  • Cyber Laws & Regulations

The Legal and Technical Implications of Forcing Google to Share Search Data

Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
  • News

Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications

ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
  • APT-News

ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation

Google Apps Script Exploited in Sophisticated Phishing Campaigns
  • Threat Intelligence

Google Apps Script Exploited in Sophisticated Phishing Campaigns

Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
  • CVE News

Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation

  • Latest
  • Popular
  • The Legal and Technical Implications of Forcing Google to Share Search Data

    The Legal and Technical Implications of Forcing Google to Share Search Data

    May 30, 2025
  • Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications

    Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications

    May 30, 2025
  • ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation

    ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation

    May 29, 2025
  • Google Apps Script Exploited in Sophisticated Phishing Campaigns

    Google Apps Script Exploited in Sophisticated Phishing Campaigns

    May 29, 2025
  • Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework

    Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework

    May 2, 2025 3
  • Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint

    Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint

    April 3, 2025
  • CVE-2025-29927 – Next.js Authorization Bypass in Middleware

    CVE-2025-29927 – Next.js Authorization Bypass in Middleware

    March 21, 2025
  • Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping…. Fig. 1 – A screenshot showing the results of Get-InjectedThreadEx scanning a process into which a 4.11 Beacon has just been injected.

    Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….

    March 22, 2025
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
  • CVE News

Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation

May 29, 2025
PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing
  • Red-Team

PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing

May 28, 2025

Data Breaches

Victoria’s Secret Cybersecurity Incident: Analysis and Implications for Enterprise Security
  • Data Breach

Victoria’s Secret Cybersecurity Incident: Analysis and Implications for Enterprise Security

May 29, 2025
Adidas Data Breach: Third-Party Provider Hack Exposes Customer Contact Data
  • Data Breach

Adidas Data Breach: Third-Party Provider Hack Exposes Customer Contact Data

May 27, 2025
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
  • Data Breach

SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise

May 20, 2025
Australian Human Rights Commission Data Breach: Technical Analysis and Impact
  • Data Breach

Australian Human Rights Commission Data Breach: Technical Analysis and Impact

May 14, 2025

Red Team

Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation

Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation

May 29, 2025
PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing

PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing

May 28, 2025
ChatGPT-o3 Evasion Tactics: AI Model Alters Shutdown Script in Controlled Test

ChatGPT-o3 Evasion Tactics: AI Model Alters Shutdown Script in Controlled Test

May 25, 2025

Blue Team

Attack Surface Mapping: How Adversaries Outpace Defenders and How to Respond

Attack Surface Mapping: How Adversaries Outpace Defenders and How to Respond

May 29, 2025
Prioritizing Exploitable Vulnerabilities: Cutting Through the Noise of CVSS Scores

Prioritizing Exploitable Vulnerabilities: Cutting Through the Noise of CVSS Scores

May 27, 2025
ThreatLocker’s Zero Trust Patch Management: Closing Vulnerability Windows at Scale

ThreatLocker’s Zero Trust Patch Management: Closing Vulnerability Windows at Scale

May 21, 2025

Threat Intelligence

ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation

ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation

May 29, 2025
DragonForce Ransomware Exploits SimpleHelp RMM in MSP Supply Chain Attacks

DragonForce Ransomware Exploits SimpleHelp RMM in MSP Supply Chain Attacks

May 27, 2025
Russian Void Blizzard APT Linked to Dutch Police Breach via Exchange Server Exploit

Russian Void Blizzard APT Linked to Dutch Police Breach via Exchange Server Exploit

May 27, 2025

You may have missed

The Legal and Technical Implications of Forcing Google to Share Search Data
  • Cyber Laws & Regulations

The Legal and Technical Implications of Forcing Google to Share Search Data

May 30, 2025
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
  • News

Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications

May 30, 2025
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
  • APT-News

ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation

May 29, 2025
Google Apps Script Exploited in Sophisticated Phishing Campaigns
  • Threat Intelligence

Google Apps Script Exploited in Sophisticated Phishing Campaigns

May 29, 2025
Copyright © All rights reserved.