Skip to content
Red-Team News
The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI
Primary Menu
All News
Red-Team
Security Tools & Research
Exploitation
C2-Updates
CVE News
Bug Bounties & Responsible Disclosure
Blue-Team
APT-News
Security Tools & Research
Malware Analysis
SIEM & Detection Engineering
CVE News
Threat Intelligence
CVE News
Data Breaches
Cyber Laws & Regulations
Other
Search for:
Join The Newsletter
Latest Vulnerabilities
1
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
2
Critical Unpatched Vulnerabilities in Versa Concerto Expose Systems to Auth Bypass and RCE
3
Critical SAMLify SSO Vulnerability Enables Admin Impersonation via Signature Wrapping
4
Critical Privilege Escalation Vulnerability in WordPress Motors Theme (CVE-2025-4322)
5
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
1
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
2
Critical Unpatched Vulnerabilities in Versa Concerto Expose Systems to Auth Bypass and RCE
3
Critical SAMLify SSO Vulnerability Enables Admin Impersonation via Signature Wrapping
4
Critical Privilege Escalation Vulnerability in WordPress Motors Theme (CVE-2025-4322)
5
O2 UK VoLTE/WiFi Calling Flaw Exposes User Location via Call Metadata
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
CVE News
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
The Legal and Technical Implications of Forcing Google to Share Search Data
Cyber Laws & Regulations
The Legal and Technical Implications of Forcing Google to Share Search Data
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
News
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
APT-News
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
Google Apps Script Exploited in Sophisticated Phishing Campaigns
Threat Intelligence
Google Apps Script Exploited in Sophisticated Phishing Campaigns
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
CVE News
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
The Legal and Technical Implications of Forcing Google to Share Search Data
Cyber Laws & Regulations
The Legal and Technical Implications of Forcing Google to Share Search Data
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
News
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
APT-News
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
Google Apps Script Exploited in Sophisticated Phishing Campaigns
Threat Intelligence
Google Apps Script Exploited in Sophisticated Phishing Campaigns
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
CVE News
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
Latest
Popular
The Legal and Technical Implications of Forcing Google to Share Search Data
The Legal and Technical Implications of Forcing Google to Share Search Data
May 30, 2025
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
May 30, 2025
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
May 29, 2025
Google Apps Script Exploited in Sophisticated Phishing Campaigns
Google Apps Script Exploited in Sophisticated Phishing Campaigns
May 29, 2025
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
Strategic Cyber Warfare Preparedness: A CISO’s Defense Framework
May 2, 2025
3
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
Verizon Call Filter API Vulnerability Exposed Customer Call Logs via Unsecured Endpoint
April 3, 2025
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
CVE-2025-29927 – Next.js Authorization Bypass in Middleware
March 21, 2025
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
March 22, 2025
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
CVE News
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
May 29, 2025
PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing
Red-Team
PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing
May 28, 2025
Data Breaches
Victoria’s Secret Cybersecurity Incident: Analysis and Implications for Enterprise Security
Data Breach
Victoria’s Secret Cybersecurity Incident: Analysis and Implications for Enterprise Security
May 29, 2025
Adidas Data Breach: Third-Party Provider Hack Exposes Customer Contact Data
Data Breach
Adidas Data Breach: Third-Party Provider Hack Exposes Customer Contact Data
May 27, 2025
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
Data Breach
SK Telecom’s 3-Year Malware Breach: Technical Analysis of a 27M Subscriber Compromise
May 20, 2025
Australian Human Rights Commission Data Breach: Technical Analysis and Impact
Data Breach
Australian Human Rights Commission Data Breach: Technical Analysis and Impact
May 14, 2025
Red Team
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
Apple Safari Fullscreen BitM Attack: Exploitation and Mitigation
May 29, 2025
PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing
PumaBot: A New Go-Based Botnet Targeting IoT Devices via SSH Brute-Forcing
May 28, 2025
ChatGPT-o3 Evasion Tactics: AI Model Alters Shutdown Script in Controlled Test
ChatGPT-o3 Evasion Tactics: AI Model Alters Shutdown Script in Controlled Test
May 25, 2025
Blue Team
Attack Surface Mapping: How Adversaries Outpace Defenders and How to Respond
Attack Surface Mapping: How Adversaries Outpace Defenders and How to Respond
May 29, 2025
Prioritizing Exploitable Vulnerabilities: Cutting Through the Noise of CVSS Scores
Prioritizing Exploitable Vulnerabilities: Cutting Through the Noise of CVSS Scores
May 27, 2025
ThreatLocker’s Zero Trust Patch Management: Closing Vulnerability Windows at Scale
ThreatLocker’s Zero Trust Patch Management: Closing Vulnerability Windows at Scale
May 21, 2025
Threat Intelligence
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
May 29, 2025
DragonForce Ransomware Exploits SimpleHelp RMM in MSP Supply Chain Attacks
DragonForce Ransomware Exploits SimpleHelp RMM in MSP Supply Chain Attacks
May 27, 2025
Russian Void Blizzard APT Linked to Dutch Police Breach via Exchange Server Exploit
Russian Void Blizzard APT Linked to Dutch Police Breach via Exchange Server Exploit
May 27, 2025
You may have missed
The Legal and Technical Implications of Forcing Google to Share Search Data
Cyber Laws & Regulations
The Legal and Technical Implications of Forcing Google to Share Search Data
May 30, 2025
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
News
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
May 30, 2025
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
APT-News
ConnectWise ScreenConnect Breach: Nation-State Attack Analysis and Mitigation
May 29, 2025
Google Apps Script Exploited in Sophisticated Phishing Campaigns
Threat Intelligence
Google Apps Script Exploited in Sophisticated Phishing Campaigns
May 29, 2025