Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
47c3dbecdb28b8c95229ec57ef7378aef727ff832a39add4e5288f66fc8b5603
  • Tools

SafeLine – Serve As A Reverse Proxy To Protect Your Web Services From Attacks And Exploits

September 25, 2024

SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall...

Read MoreRead more about SafeLine – Serve As A Reverse Proxy To Protect Your Web Services From Attacks And Exploits
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 60[.]204[.]138[.]63:80

September 25, 2024

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 60[.]204[.]138[.]63:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]139[.]161[.]196:4000

September 25, 2024

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 43[.]139[.]161[.]196:4000
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: triverus[.]com

September 25, 2024

Ransomware Group: LYNX VICTIM NAME: triveruscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [LYNX] – Ransomware Victim: triverus[.]com
cyberattack
  • News

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

September 25, 2024

Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of...

Read MoreRead more about Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware
macos
  • News

ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function

September 25, 2024

A now-patched security vulnerability in OpenAI's ChatGPT app for macOS could have made it possible for attackers to plant long-term...

Read MoreRead more about ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function
soc
  • News

Agentic AI in SOCs: A Solution to SOAR’s Unfulfilled Promises

September 25, 2024

Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing...

Read MoreRead more about Agentic AI in SOCs: A Solution to SOAR’s Unfulfilled Promises
image
  • Vulnerabilities

CVE Alert: CVE-2024-38268

September 25, 2024

Vulnerability Summary: CVE-2024-38268 An improper restriction of operations within the bounds of a memory buffer in the MAC address parser...

Read MoreRead more about CVE Alert: CVE-2024-38268
image
  • Vulnerabilities

CVE Alert: CVE-2024-38267

September 25, 2024

Vulnerability Summary: CVE-2024-38267 An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser...

Read MoreRead more about CVE Alert: CVE-2024-38267
image
  • Vulnerabilities

CVE Alert: CVE-2024-38266

September 25, 2024

Vulnerability Summary: CVE-2024-38266 An improper restriction of operations within the bounds of a memory buffer in the parameter type parser...

Read MoreRead more about CVE Alert: CVE-2024-38266
image
  • Vulnerabilities

CVE Alert: CVE-2024-8657

September 25, 2024

Vulnerability Summary: CVE-2024-8657 The Garden Gnome Package plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ggpkg...

Read MoreRead more about CVE Alert: CVE-2024-8657
image
  • Vulnerabilities

CVE Alert: CVE-2024-8795

September 25, 2024

Vulnerability Summary: CVE-2024-8795 The BA Book Everything plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up...

Read MoreRead more about CVE Alert: CVE-2024-8795
image
  • Vulnerabilities

CVE Alert: CVE-2024-38269

September 25, 2024

Vulnerability Summary: CVE-2024-38269 An improper restriction of operations within the bounds of a memory buffer in the USB file-sharing handler...

Read MoreRead more about CVE Alert: CVE-2024-38269
image
  • Vulnerabilities

CVE Alert: CVE-2024-8432

September 25, 2024

Vulnerability Summary: CVE-2024-8432 The Appointment & Event Booking Calendar Plugin – Webba Booking plugin for WordPress is vulnerable to unauthorized...

Read MoreRead more about CVE Alert: CVE-2024-8432
image
  • Vulnerabilities

CVE Alert: CVE-2024-8544

September 25, 2024

Vulnerability Summary: CVE-2024-8544 The Pixel Cat – Conversion Pixel Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due...

Read MoreRead more about CVE Alert: CVE-2024-8544
image
  • Data Breach
  • Ransomware

[CACTUS] – Ransomware Victim: www[.]amchar[.]com

September 25, 2024

Ransomware Group: CACTUS VICTIM NAME: wwwamcharcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [CACTUS] – Ransomware Victim: www[.]amchar[.]com
image
  • Data Breach
  • Ransomware

[CACTUS] – Ransomware Victim: kjtait[.]com

September 25, 2024

Ransomware Group: CACTUS VICTIM NAME: kjtaitcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [CACTUS] – Ransomware Victim: kjtait[.]com
image
  • Data Breach
  • Ransomware

[CACTUS] – Ransomware Victim: hindlegroup[.]com

September 25, 2024

Ransomware Group: CACTUS VICTIM NAME: hindlegroupcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [CACTUS] – Ransomware Victim: hindlegroup[.]com
software
  • News

CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns

September 25, 2024

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual Traffic Manager...

Read MoreRead more about CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns
image
  • Vulnerabilities

CVE Alert: CVE-2024-8738

September 25, 2024

Vulnerability Summary: CVE-2024-8738 The Seriously Simple Stats plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use...

Read MoreRead more about CVE Alert: CVE-2024-8738
image
  • Vulnerabilities

CVE Alert: CVE-2024-8716

September 25, 2024

Vulnerability Summary: CVE-2024-8716 The XT Ajax Add To Cart for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting...

Read MoreRead more about CVE Alert: CVE-2024-8716
image
  • Vulnerabilities

CVE Alert: CVE-2024-8662

September 25, 2024

Vulnerability Summary: CVE-2024-8662 The Koko Analytics plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of...

Read MoreRead more about CVE Alert: CVE-2024-8662
image
  • Vulnerabilities

CVE Alert: CVE-2024-8628

September 25, 2024

Vulnerability Summary: CVE-2024-8628 The Popup, Optin Form & Email Newsletters for Mailchimp, HubSpot, AWeber – MailOptin plugin for WordPress is...

Read MoreRead more about CVE Alert: CVE-2024-8628
image
  • Vulnerabilities

CVE Alert: CVE-2024-8624

September 25, 2024

Vulnerability Summary: CVE-2024-8624 The MDTF – Meta Data and Taxonomies Filter plugin for WordPress is vulnerable to SQL Injection via...

Read MoreRead more about CVE Alert: CVE-2024-8624

Posts pagination

Previous 1 … 1,000 1,001 1,002 1,003 1,004 1,005 1,006 … 4,246 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-53025

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53024

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53032

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53031

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53023

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel