Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025

A friendly walkthrough of a slick binary-exploitation challenge: custom shellcode without syscall, ASLR bypass via GOT, and why stack alignment...

Read MoreRead more about [TRYHACKME] – Void Execution Challenge
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025

Introduction In this room we compromise a small Flask app behind Gunicorn, pivot from a clever SSRF to local file...

Read MoreRead more about [TRYHACKME] – LondonBridge Full Walkthrough.
image
  • Vulnerabilities

CVE Alert: CVE-2025-54111 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54111 HIGHNo exploitation known Use after free in Windows UI XAML Phone DatePickerFlyout allows an authorized attacker to elevate privileges...

Read MoreRead more about CVE Alert: CVE-2025-54111 – Microsoft – Windows 10 Version 1809
image
  • Vulnerabilities

CVE Alert: CVE-2025-54106 – Microsoft – Windows Server 2019

September 10, 2025

CVE-2025-54106 HIGHNo exploitation known Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker...

Read MoreRead more about CVE Alert: CVE-2025-54106 – Microsoft – Windows Server 2019
image
  • Vulnerabilities

CVE Alert: CVE-2025-54110 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54110 HIGHNo exploitation known Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally. CVSS...

Read MoreRead more about CVE Alert: CVE-2025-54110 – Microsoft – Windows 10 Version 1809
image
  • Vulnerabilities

CVE Alert: CVE-2025-54112 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54112 HIGHNo exploitation known Use after free in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally....

Read MoreRead more about CVE Alert: CVE-2025-54112 – Microsoft – Windows 10 Version 1809
image
  • Vulnerabilities

CVE Alert: CVE-2025-54108 – Microsoft – Windows Server 2025 (Server Core installation)

September 10, 2025

CVE-2025-54108 HIGHNo exploitation known Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc)...

Read MoreRead more about CVE Alert: CVE-2025-54108 – Microsoft – Windows Server 2025 (Server Core installation)
image
  • Vulnerabilities

CVE Alert: CVE-2025-54103 – Microsoft – Windows 10 Version 21H2

September 10, 2025

CVE-2025-54103 HIGHNo exploitation known Use after free in Windows Management Services allows an unauthorized attacker to elevate privileges locally. CVSS...

Read MoreRead more about CVE Alert: CVE-2025-54103 – Microsoft – Windows 10 Version 21H2
image
  • Vulnerabilities

CVE Alert: CVE-2025-54105 – Microsoft – Windows Server 2025 (Server Core installation)

September 10, 2025

CVE-2025-54105 HIGHNo exploitation known Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows...

Read MoreRead more about CVE Alert: CVE-2025-54105 – Microsoft – Windows Server 2025 (Server Core installation)
image
  • Vulnerabilities

CVE Alert: CVE-2025-54102 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54102 HIGHNo exploitation known Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges...

Read MoreRead more about CVE Alert: CVE-2025-54102 – Microsoft – Windows 10 Version 1809
image
  • Vulnerabilities

CVE Alert: CVE-2025-54093 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54093 HIGHNo exploitation known Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally....

Read MoreRead more about CVE Alert: CVE-2025-54093 – Microsoft – Windows 10 Version 1809
image
  • Vulnerabilities

CVE Alert: CVE-2025-54098 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54098 HIGHNo exploitation known Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally. CVSS v3.1...

Read MoreRead more about CVE Alert: CVE-2025-54098 – Microsoft – Windows 10 Version 1809
image
  • Vulnerabilities

CVE Alert: CVE-2025-54092 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54092 HIGHNo exploitation known Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized...

Read MoreRead more about CVE Alert: CVE-2025-54092 – Microsoft – Windows 10 Version 1809
image
  • Vulnerabilities

CVE Alert: CVE-2025-54091 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54091 HIGHNo exploitation known Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to elevate privileges locally. CVSS...

Read MoreRead more about CVE Alert: CVE-2025-54091 – Microsoft – Windows 10 Version 1809
image
  • Vulnerabilities

CVE Alert: CVE-2025-54099 – Microsoft – Windows 10 Version 1809

September 10, 2025

CVE-2025-54099 HIGHNo exploitation known Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate...

Read MoreRead more about CVE Alert: CVE-2025-54099 – Microsoft – Windows 10 Version 1809
cybercrime
  • News

Ubuntu Users Left Waiting After Canonical’s Servers Take Weekend Off

September 10, 2025

When is an outage not an outage? According to Canonical's forum, it's when a 36-minute server disruption creates a multi-day...

Read MoreRead more about Ubuntu Users Left Waiting After Canonical’s Servers Take Weekend Off
cybercrime
  • News

Playing Ball Games In The Datacenter Was Obviously Stupid, But We Had To Win Theleague

September 10, 2025

Who, Me? Monday mornings see the resumption of endless coopetition between IT folks and those they strive to serve but...

Read MoreRead more about Playing Ball Games In The Datacenter Was Obviously Stupid, But We Had To Win Theleague
cybercrime
  • News

All It Work To Involve Ai By 2030, Says Gartner, But Jobs Are Safe

September 10, 2025

All work in IT departments will be done with the help of AI by 2030, according to analyst firm Gartner,...

Read MoreRead more about All It Work To Involve Ai By 2030, Says Gartner, But Jobs Are Safe
cybercrime
  • News

Anthropic To Pay At Least $1.5 Billion To Authors Whose Work It Knowinglypirated

September 10, 2025

AI upstart Anthropic has agreed to create a $1.5 billion fund it will use to compensate authors whose works it...

Read MoreRead more about Anthropic To Pay At Least $1.5 Billion To Authors Whose Work It Knowinglypirated
cybercrime
  • News

Red Hat Back Office Team To Be Big And Blue Whether They Like It Or Not

September 10, 2025

IBM-owned subsidiary Red Hat is docking a bunch of its back-office staff, along with the techies that support them, into...

Read MoreRead more about Red Hat Back Office Team To Be Big And Blue Whether They Like It Or Not
cybercrime
  • News

Pre Owned Software Trial Kicks Off In Uk As Microsoft Pushes Resale Ban

September 10, 2025

Microsoft's tussle with UK-based reseller ValueLicensing over the sale of secondhand licenses returns to the UK's Competition Appeal Tribunal this...

Read MoreRead more about Pre Owned Software Trial Kicks Off In Uk As Microsoft Pushes Resale Ban
cybercrime
  • News

Linus Has Had Enough Of Links That Point To ‘stupid Useless Garbage’

September 10, 2025

The latest release candidate for Linux is out, but before its release, Linus Torvalds had something he wanted to get...

Read MoreRead more about Linus Has Had Enough Of Links That Point To ‘stupid Useless Garbage’
cybercrime
  • News

Cisa Sounds Alarm Over Tp Link Wireless Routers Under Attack

September 10, 2025

Infosec in brief The US Cybersecurity and Infrastructure Security Agency (CISA) has said two flaws in routers made by Chinese...

Read MoreRead more about Cisa Sounds Alarm Over Tp Link Wireless Routers Under Attack
cybercrime
  • News

Dev Snared In Crypto Phishing Net, 18 Npm Packages Compromised

September 10, 2025

Crims have added backdoors to at least 18 npm packages after developer Josh Junon inadvertently authorized a reset of the...

Read MoreRead more about Dev Snared In Crypto Phishing Net, 18 Npm Packages Compromised

Posts pagination

1 2 3 4 … 4,407 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54111 – Microsoft – Windows 10 Version 1809

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54106 – Microsoft – Windows Server 2019

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54110 – Microsoft – Windows 10 Version 1809

September 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel