Skip to content

Red-Team News

The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI

  • All News
  • Red-Team
    • Security Tools & Research
    • Exploitation
    • C2-Updates
    • CVE News
    • Bug Bounties & Responsible Disclosure
  • Blue-Team
    • APT-News
    • Security Tools & Research
    • Malware Analysis
    • SIEM & Detection Engineering
    • CVE News
  • Threat Intelligence
    • CVE News
    • Data Breaches
  • Cyber Laws & Regulations
  • Other
Join The Newsletter
  • Home
  • News
  • Underground Hacking Forums

Underground Hacking Forums

The Turmoil Following BreachForums Shutdown: Confusion, Risks, and a New Beginning
  • Data Breach

The Turmoil Following BreachForums Shutdown: Confusion, Risks, and a New Beginning

The abrupt shutdown of BreachForums, a major cybercrime marketplace, on April 15, 2025, has left the cybersecurity...
Read More
Telekopye Cybercriminals Now Target Booking.com and Airbnb Users in Sophisticated Hotel Scams
  • APT-News

Telekopye Cybercriminals Now Target Booking.com and Airbnb Users in Sophisticated Hotel Scams

ESET researchers have uncovered a significant evolution in the operations of the Telekopye cybercriminal network, which has...
Read More
Dealing with the SolarWinds Orion Compromise: Immediate Actions for Organizations
  • APT-News
  • Data Breach

Dealing with the SolarWinds Orion Compromise: Immediate Actions for Organizations

The SolarWinds Orion compromise, disclosed in December 2020, remains one of the most significant cybersecurity incidents in...
Read More
NCSC Warns of Cryptojacking: How Malicious Software is Exploiting Devices for Illicit Cryptocurrency Mining
  • Blue-Team
  • Exploitation

NCSC Warns of Cryptojacking: How Malicious Software is Exploiting Devices for Illicit Cryptocurrency Mining

The National Cyber Security Centre (NCSC) has issued a warning about the increasing use of malicious software...
Read More

You may have missed

Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)
  • CVE News

Public Exploit Details Emerge for Critical Cisco IOS XE Vulnerability (CVE-2025-20188)

May 31, 2025
Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation
  • APT-News

Germany Identifies Conti and TrickBot Leader: A Deep Dive into the Cybercrime Operation

May 30, 2025
The Legal and Technical Implications of Forcing Google to Share Search Data
  • Cyber Laws & Regulations

The Legal and Technical Implications of Forcing Google to Share Search Data

May 30, 2025
Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications
  • News

Microsoft Authenticator Password Autofill Deprecation: Migration and Security Implications

May 30, 2025
Copyright © All rights reserved.