Skip to content

Red-Team News

The latest cybersecurity news, threat intelligence, and C2 development news enhanced by AI

  • All News
  • Red-Team
    • Security Tools & Research
    • Exploitation
    • C2-Updates
    • CVE News
    • Bug Bounties & Responsible Disclosure
  • Blue-Team
    • APT-News
    • Security Tools & Research
    • Malware Analysis
    • SIEM & Detection Engineering
    • CVE News
  • Threat Intelligence
    • CVE News
    • Data Breaches
  • Cyber Laws & Regulations
  • Other
Join The Newsletter
  • Home
  • News
  • Wi-Fi Security

Wi-Fi Security

Russian APT28’s “Nearest Neighbor Attack”: Weaponizing Nearby Wi-Fi Networks for Covert Access
  • APT-News

Russian APT28’s “Nearest Neighbor Attack”: Weaponizing Nearby Wi-Fi Networks for Covert Access

In early 2022, Russian state-sponsored threat actor APT28 (also tracked as GruesomeLarch) deployed a novel attack vector...
Read More
Dealing with the SolarWinds Orion Compromise: Immediate Actions for Organizations
  • APT-News
  • Data Breach

Dealing with the SolarWinds Orion Compromise: Immediate Actions for Organizations

The SolarWinds Orion compromise, disclosed in December 2020, remains one of the most significant cybersecurity incidents in...
Read More
NCSC Warns of Cryptojacking: How Malicious Software is Exploiting Devices for Illicit Cryptocurrency Mining
  • Blue-Team
  • Exploitation

NCSC Warns of Cryptojacking: How Malicious Software is Exploiting Devices for Illicit Cryptocurrency Mining

The National Cyber Security Centre (NCSC) has issued a warning about the increasing use of malicious software...
Read More

You may have missed

Antitrust Lawsuit Against Apple and OpenAI: Technical Implications for Platform Security
  • Cyber Laws & Regulations

Antitrust Lawsuit Against Apple and OpenAI: Technical Implications for Platform Security

August 25, 2025
Critical Docker Desktop Vulnerability CVE-2025-9074 Enables Host Takeover
  • CVE News

Critical Docker Desktop Vulnerability CVE-2025-9074 Enables Host Takeover

August 25, 2025
Defending Against Malware Persistence Techniques: A Comprehensive Guide with Wazuh
  • Blue-Team

Defending Against Malware Persistence Techniques: A Comprehensive Guide with Wazuh

August 25, 2025
Android.Backdoor.916.origin: Espionage Malware Impersonates Russian FSB Antivirus
  • Malware Analysis

Android.Backdoor.916.origin: Espionage Malware Impersonates Russian FSB Antivirus

August 25, 2025
Copyright © All rights reserved.