• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From redteamnews.com

How Common Oversights Make Homes Prime Targets for Burglary: A Security Perspective - Red-Team News

0 2

A police officer has revealed a simple yet often overlooked habit that could prevent homes from becoming targets

on Sun, 10PM

From redteamnews.com

Martin Lewis’ Mobile Security Alert: How to Retrieve and Secure Your IMEI - Red-Team News

0 1

Financial expert Martin Lewis has issued a security alert urging all mobile phone users to retrieve their device’s

on Sun, 10PM

From redteamnews.com

Hamadan's Largest Industrial Zone Finalized for Development - Cybersecurity News

0 3

The fate of Hamadan’s largest industrial zone has been officially determined, marking a significant milestone for regional economic

on Wed, 6PM

From redteamnews.com

Is Kyle Larson Poised to Dominate NASCAR? Kevin Harvick Sounds the Alarm - Cybersecurity News

0 3

Kyle Larson’s recent performances have sparked discussions about whether the Hendrick Motorsports driver is entering a phase of

on Wed, 6PM

From redteamnews.com

Gaza's Dire Humanitarian Crisis: No Drinking Water or Fuel Amid Escalating Conflict - Cybersecurity News

0 3

The humanitarian situation in Gaza has reached catastrophic levels, with reports indicating a severe shortage of drinking water

on Wed, 6PM

From redteamnews.com

Former Delaware School Principal Charged with Years-Long Sexual Abuse of Student - Cybersecurity News

0 1

A former Delaware high school principal has been accused of sexually assaulting a student over several years, according

on Wed, 6PM

From redteamnews.com

Trump Administration Restructures CISA with Staff and Budget Cuts - Cybersecurity News

0 3

The Trump administration has initiated a restructuring of the Cybersecurity and Infrastructure Security Agency (CISA), involving significant personnel

on Wed, 6PM

From redteamnews.com

Gen Z Woman's Viral Comment About Friend's 'Super-Loud' Baby Sparks Online Debate - Cybersecurity News

0 1

A Gen Z woman’s blunt remark to a friend about her “super-loud” baby has gone viral, with many

on Wed, 5PM

From redteamnews.com

Why Millennials Are 'Built Different': A Generational Analysis on Adaptability and Resilience - Cybersecurity News

0 1

Millennials, often characterized as the generation born between 1981 and 1996, have been labeled as “built different” due

on Wed, 5PM

From redteamnews.com

Home - Red-Team News

0 0

This is a front page template page created by Superb Addons. You can edit this page's content and

on Wed, 9AM

From redteamnews.com

Indonesian E-Learning Platform Reportedly Targeted in Cybersecurity Incident - Red-Team News

0 1

Reports indicate that a prominent Indonesian educational technology platform may have been the target of a cybersecurity breach.

on Wed, 9AM

From redteamnews.com

10GB of Stolen Login Credentials Reportedly Leaked by Threat Actor - Red-Team News

0 1

A threat actor has allegedly obtained and leaked approximately 10GB of stolen login credentials, posing a significant risk

on Wed, 1AM

From redteamnews.com

Strengthening Defenses Against Identity-Based Cyber Attacks - Red-Team News

0 1

Identity-based attacks remain one of the most pervasive threats in cybersecurity, leveraging stolen or compromised credentials to bypass

on Wed, 1AM

From redteamnews.com

Critical Microsoft Exchange Vulnerability Exploited in Phishing Campaigns Targeting Russian Entities - Red-Team News

0 3

Security researchers have identified active exploitation of a high-severity Microsoft Exchange vulnerability (CVE-2023-XXXX) in targeted phishing campaigns against

on Wed, 12AM

From redteamnews.com

Upcoming Book Talk Events for "Chasing Shadows" – March 2024 - Red-Team News

0 1

Join us for an engaging series of book talks in March 2024 featuring discussions on Chasing Shadows, a

on Tue, 11PM

From redteamnews.com

NIST SP 800-82r3: Strengthening OT Security with Dragos and NP-View Integration - Red-Team News

0 1

The latest revision of NIST SP 800-82 (r3) provides critical guidance for securing Operational Technology (OT) systems, emphasizing

on Tue, 11PM

From redteamnews.com

INTERPOL's Global Cybercrime Crackdown: 306 Arrested, 1,842 Devices Seized - Red-Team News

0 1

In a coordinated international operation, INTERPOL has arrested 306 suspects and seized 1,842 electronic devices in a sweeping

on Tue, 10PM

From redteamnews.com

VanHelsing RaaS Emerges: Double Extortion, Multi-OS Targeting, and $5K Entry Fee - Red-Team News

0 1

A new ransomware-as-a-service (RaaS) operation dubbed “VanHelsing” has surfaced, targeting multiple operating systems and employing double extortion tactics.

on Tue, 10PM

From redteamnews.com

Critical Unauthenticated RCE Vulnerability Discovered in Ingress NGINX Controller - Red-Team News

0 1

A severe remote code execution (RCE) vulnerability has been identified in the Ingress NGINX Controller, allowing attackers to

on Tue, 10PM

From redteamnews.com

Hackers Exploit .NET MAUI to Deliver Fake Banking and Social Apps in India and China - Red-Team News

0 1

Security researchers have identified a new campaign where threat actors are leveraging Microsoft’s .NET Multi-platform App UI (.NET

on Tue, 10PM

From redteamnews.com

Google TAG Q2 2024 Report: State-Linked Influence Operations Targeted Across Platforms - Red-Team News

0 3

Google’s Threat Analysis Group (TAG) has released its quarterly bulletin revealing the termination of thousands of accounts linked

on Tue, 3PM

From redteamnews.com

Critical PostgreSQL SQLi and Palo Alto VPN Exploits Targeted in Latest Snort Rules Update (Feb 2025 Week 4) - Red-Team News

0 3

AhnLab’s Threat Intelligence Platform has released 19 new Snort rules addressing critical vulnerabilities including PostgreSQL SQL injection (CVE-2025-1094),

on Tue, 3PM

From redteamnews.com

Google TAG Q2 2023 Bulletin: State-Sponsored Influence Operations and Spam Networks - Red-Team News

0 3

Google’s Threat Analysis Group (TAG) has released its Q2 2023 bulletin, providing critical insights into coordinated influence operations

on Tue, 3PM

From redteamnews.com

LummaC2 Malware Targets Windows Users Through Fake Total Commander Crack - Red-Team News

0 3

Security researchers have uncovered a sophisticated malware campaign distributing the LummaC2 information stealer disguised as a cracked version

on Tue, 2PM

From redteamnews.com

February 2025 Financial Sector Cyber Threats: Korean & Global Security Analysis - Red-Team News

0 3

A recent ASEC report reveals intensifying cyber threats against financial institutions in South Korea and worldwide, with significant

on Tue, 2PM

From redteamnews.com

Active Directory Security: Detecting and Mitigating WriteDacl Abuse Risks - Red-Team News

0 3

Active Directory Discretionary Access Control Lists (DACLs) serve as a fundamental security mechanism governing access to directory objects.

on Tue, 2PM

From redteamnews.com

Diamond Ticket Attacks: The Stealthy Kerberos Exploit Targeting Active Directory - Red-Team News

0 3

The Diamond Ticket attack represents an advanced exploitation technique targeting Active Directory environments by manipulating Kerberos authentication mechanisms.

on Tue, 2PM

From redteamnews.com

Ivanti VPN Zero-Day Exploits: Critical Vulnerabilities and Advanced Persistence Techniques - Red-Team News

0 3

Security teams worldwide are grappling with widespread exploitation of Ivanti Connect Secure VPN appliances, as researchers uncover sophisticated

on Tue, 2PM

From redteamnews.com

JPHP-Based Malware Evades Detection Using Java-PHP Hybrid Approach - Red-Team News

0 3

A newly discovered malware campaign is leveraging the JPHP interpreter – a PHP implementation running on the Java

on Tue, 2PM

From redteamnews.com

Active Directory Security: Exploiting and Mitigating GenericWrite DACL Vulnerabilities - Red-Team News

0 3

Active Directory’s Discretionary Access Control Lists (DACLs) serve as fundamental security mechanisms governing object permissions within directory services.

on Tue, 2PM

From redteamnews.com

Critical Zero-Day Exploit in Palo Alto GlobalProtect Firewalls (CVE-2024-3400) Actively Exploited - Red-Team News

0 3

A critical zero-day vulnerability (CVE-2024-3400) in Palo Alto Networks’ PAN-OS firewalls has been actively exploited since at least

on Tue, 2PM

From redteamnews.com

Detecting and Mitigating CVE-2024-3400: Critical Zero-Day in Palo Alto GlobalProtect - Red-Team News

0 3

A critical zero-day vulnerability (CVE-2024-3400) in Palo Alto Networks’ PAN-OS GlobalProtect feature has been actively exploited since March

on Tue, 2PM

From redteamnews.com

StormBamboo APT Targets ISPs to Poison Software Updates with Malware - Red-Team News

0 3

A China-linked cyberespionage group known as StormBamboo (also tracked as Evasive Panda, Daggerfly, and Bronze Highland) has compromised

on Tue, 2PM

From redteamnews.com

XE Group's Cybercrime Evolution: From Credit Card Skimming to Zero-Day Exploitation - Red-Team News

0 3

The XE Group, a cybercrime syndicate with suspected Vietnamese origins, has dramatically evolved its operations from traditional credit

on Tue, 2PM

From redteamnews.com

Memory Forensics Exposes Ivanti VPN Zero-Day Exploits: A Critical Security Breakdown - Red-Team News

0 3

Recent forensic investigations by Volexity have uncovered a sophisticated attack campaign exploiting two chained zero-day vulnerabilities in Ivanti

on Tue, 2PM

From redteamnews.com

Arcane Stealer Malware Targets Gamers via YouTube and Discord, Steals VPN Credentials - Red-Team News

0 3

A sophisticated malware campaign dubbed “Arcane Stealer” is actively targeting gamers and VPN users through compromised YouTube videos

on Tue, 2PM

From redteamnews.com

Russian APT28's "Nearest Neighbor Attack": Weaponizing Nearby Wi-Fi Networks for Covert Access - Red-Team News

0 3

In early 2022, Russian state-sponsored threat actor APT28 (also tracked as GruesomeLarch) deployed a novel attack vector dubbed

on Tue, 2PM

From redteamnews.com

Active Directory Security Testing with Netexec: A Red Team Perspective - Red-Team News

0 3

Active Directory penetration testing remains a cornerstone of enterprise security assessments, with tools like Netexec providing robust capabilities

on Tue, 2PM

From redteamnews.com

Active Directory Security Risk: Exploiting AddSelf Permissions for Privilege Escalation - Red-Team News

0 3

A critical misconfiguration in Active Directory’s Discretionary Access Control Lists (DACLs) allows attackers to abuse the AddSelf permission

on Tue, 1PM

From redteamnews.com

Active Directory Security: Detecting and Mitigating WriteOwner Permission Abuse - Red-Team News

0 3

Misconfigured WriteOwner permissions in Active Directory can enable attackers to take ownership of critical objects, bypass security controls,

on Tue, 1PM

From redteamnews.com

Ransomware and Dark Web Threats Escalate in March 2025: New Extortion Tactics and Hacktivist Attacks - Red-Team News

0 3

The second week of March 2025 witnessed a surge in cybercriminal operations, marked by the emergence of new

on Tue, 1PM

From redteamnews.com

Fake Zoom Installers Deliver Backdoor.Win32.DEVILSHADOW.THEAABO Malware - Red-Team News

0 3

A newly identified backdoor malware, Backdoor.Win32.DEVILSHADOW.THEAABO, has been discovered embedded in counterfeit Zoom installer packages. This threat capitalizes

on Tue, 1PM

From redteamnews.com

Shadow Credentials Attack: Exploiting Active Directory for Stealthy Privilege Escalation - Red-Team News

0 3

A Shadow Credentials attack is an advanced exploitation technique targeting Active Directory Certificate Services (AD CS), enabling attackers

on Tue, 1PM

From redteamnews.com

New Mirai Botnet Variant Targets Comtrend Router Vulnerability (CVE-2020-10173) - Red-Team News

0 3

A newly identified Mirai botnet variant (IoT.Linux.MIRAI.VWISI) has begun exploiting CVE-2020-10173, a command injection vulnerability in Comtrend VR-3033

on Tue, 1PM

From redteamnews.com

GhostPack: Red Team Tactics for Active Directory Exploitation and Defense - Red-Team News

0 3

Active Directory (AD) remains a prime target for attackers due to its central role in enterprise authentication and

on Tue, 1PM

From redteamnews.com

Trojan.MSIL.SUPERNOVA.A: Technical Analysis of the Windows Trojan Threat - Red-Team News

0 3

Trojan.MSIL.SUPERNOVA.A represents a significant Windows-based threat with high damage potential despite its currently limited distribution. First identified in

on Tue, 1PM

From redteamnews.com

0ktapus Phishing Campaign: How MFA Spoofing Compromised 130+ Organizations - Red-Team News

0 3

A sophisticated phishing campaign dubbed “0ktapus” successfully bypassed multi-factor authentication (MFA) protections to compromise over 130 organizations, including

on Tue, 1PM

From redteamnews.com

Extracting Image Metadata from HTTP Captures Using Tshark for Security Analysis - Red-Team News

0 3

Network traffic analysis often reveals hidden artifacts, including images transferred over HTTP. These images can contain valuable metadata

on Tue, 1PM

From redteamnews.com

Trojan.PS1.POWLOAD.JKP: COVID-19 Themed PowerShell Malware Targeting Italian Users - Red-Team News

0 3

A new variant of the POWLOAD Trojan has emerged, leveraging COVID-19 themes to target Italian users through sophisticated

on Tue, 1PM

From redteamnews.com

Advanced Shodan CLI Techniques for Security Professionals: xargs, Download & Parse - Red-Team News

0 3

Security teams at enterprise organizations can leverage Shodan’s command-line interface (CLI) to enhance external threat intelligence gathering. This

on Tue, 1PM