Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025
unlock_membership
  • Premium Members Content

Mastering Secure Coding Practices to Protect Your Software

June 27, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for Robust Cyber Defense

June 25, 2025

Editor’s Picks

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
windows-update
  • News

Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Day Exploits

August 14, 2024

Microsoft on Tuesday shipped fixes to address a total of 90 security flaws, including 10 zero-days, of which six have...

Read MoreRead more about Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Day Exploits
ddos
  • News

DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals

August 14, 2024

Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strategies. The comprehensive Gcore Radar Report for the...

Read MoreRead more about DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals
chinese-hackers
  • News

China-Backed Earth Baku Expands Cyber Attacks to Europe, Middle East, and Africa

August 14, 2024

The China-backed threat actor known as Earth Baku has diversified its targeting footprint beyond the Indo-Pacific region to include Europe,...

Read MoreRead more about China-Backed Earth Baku Expands Cyber Attacks to Europe, Middle East, and Africa
network-traffic
  • News

Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access

August 14, 2024

Ivanti has rolled out security updates for a critical flaw in Virtual Traffic Manager (vTM) that could be exploited to...

Read MoreRead more about Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access
BianLian
  • Data Breach
  • Ransomware

BianLian Ransomware Victim: Southwest Family Medicine Associates

August 14, 2024

BianLian Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about BianLian Ransomware Victim: Southwest Family Medicine Associates
hkcert
  • HKCERT
  • News

Ubuntu Linux Kernel Multiple Vulnerabilities

August 14, 2024

Multiple vulnerabilities were identified in Ubuntu Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...

Read MoreRead more about Ubuntu Linux Kernel Multiple Vulnerabilities
hkcert
  • HKCERT
  • News

Microsoft Monthly Security Update (August 2024)

August 14, 2024

Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesMariner Medium RiskSecurity Restriction Bypass Remote Code Execution Windows Extremely High...

Read MoreRead more about Microsoft Monthly Security Update (August 2024)
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Data Encryption

August 14, 2024

Data encryption plays a crucial role in securing sensitive information in our increasingly digital world. By converting plaintext into ciphertext,...

Read MoreRead more about Unlocking the Secrets of Data Encryption
news
  • News
  • Premium Members Content

Prolific Belarusian Cybercriminal Arrested in Spain

August 14, 2024

A 38-year-old Belarusian accused of being one of the world’s most prolific Russian-speaking cybercriminals has been arrested and extradited by...

Read MoreRead more about Prolific Belarusian Cybercriminal Arrested in Spain
news
  • News
  • Premium Members Content

FBI Leads Effort to Dismantle Radar/Dispossessor Ransomware

August 14, 2024

The FBI has teamed up with law enforcers in the UK and Germany to dismantle IT infrastructure associated with a...

Read MoreRead more about FBI Leads Effort to Dismantle Radar/Dispossessor Ransomware
news
  • News
  • Premium Members Content

South Korea Warns Pyongyang Has Stolen Spy Plane Details

August 14, 2024

South Korea’s People Power Party (PPP) has demanded that a new cybersecurity law be enacted after several recent breaches of...

Read MoreRead more about South Korea Warns Pyongyang Has Stolen Spy Plane Details
news
  • News
  • Premium Members Content

Gold Mining Firm in Australia Reports Ransomware Breach

August 14, 2024

Australian gold mining firm Evolution Mining recently reported a ransomware attack on its IT systems, identified on August 8, 2024. In...

Read MoreRead more about Gold Mining Firm in Australia Reports Ransomware Breach
news
  • News
  • Premium Members Content

NIST Formalizes World’s First Post-Quantum Cryptography Standards

August 14, 2024

The world’s first post-quantum cryptography standards have been formalized by the US National Institute of Standards & Technology (NIST).The standards...

Read MoreRead more about NIST Formalizes World’s First Post-Quantum Cryptography Standards
news
  • News
  • Premium Members Content

East Valley Institute of Technology Data Breach Exposes Over 200,000 Records

August 14, 2024

The East Valley Institute of Technology (EVIT), a career training school, has experienced a cybersecurity incident that exposed the personal...

Read MoreRead more about East Valley Institute of Technology Data Breach Exposes Over 200,000 Records
news
  • News
  • Premium Members Content

Phishing Campaign Compromises 100+ Ukrainian Government Computers

August 14, 2024

More than 100 Ukrainian government computers have been compromised following a mass phishing campaign, the Computer Emergency Response Team of...

Read MoreRead more about Phishing Campaign Compromises 100+ Ukrainian Government Computers
HIBP-Banner-1
  • Data Breach

LDLC – 1,266,026 breached accounts

August 14, 2024

HIBP In March 2024, French retailer LDLC disclosed a data breach that impacted customers of their physical stores. The data...

Read MoreRead more about LDLC – 1,266,026 breached accounts
HIBP-Banner-1
  • Data Breach

National Public Data (unverified) – 133,957,569 breached accounts

August 14, 2024

HIBP In April 2024, a large trove of data made headlines as having exposed "3 billion people" due to a...

Read MoreRead more about National Public Data (unverified) – 133,957,569 breached accounts
HIBP-Banner-1
  • Data Breach

Chris Leong – 27,096 breached accounts

August 14, 2024

HIBP In August 2024, the website of Master Chris Leong "a leading Tit Tar practitioner in Malaysia" suffered a data...

Read MoreRead more about Chris Leong – 27,096 breached accounts
CISA_Logo
  • CISA

CISA: Royal Ransomware Actors Rebrand as “BlackSuit,” FBI and CISA Release Update to Advisory

August 14, 2024

Royal Ransomware Actors Rebrand as “BlackSuit,” FBI and CISA Release Update to Advisory Today, CISA—in partnership with the Federal Bureau...

Read MoreRead more about CISA: Royal Ransomware Actors Rebrand as “BlackSuit,” FBI and CISA Release Update to Advisory
CISA_Logo
  • CISA

CISA: CISA Releases One Industrial Control Systems Advisory

August 14, 2024

CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on August 6, 2024. These...

Read MoreRead more about CISA: CISA Releases One Industrial Control Systems Advisory
CISA_Logo
  • CISA

CISA: CISA Adds One Known Exploited Vulnerability to Catalog

August 14, 2024

CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA_Logo
  • CISA

CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog

August 14, 2024

CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA_Logo
  • CISA

CISA: CISA Releases Secure by Demand Guidance

August 14, 2024

CISA Releases Secure by Demand Guidance Today, CISA and the Federal Bureau of Investigation (FBI) have released Secure by Demand...

Read MoreRead more about CISA: CISA Releases Secure by Demand Guidance
CISA_Logo
  • CISA

CISA: CISA Releases One Industrial Control Systems Advisory

August 14, 2024

CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on August 8, 2024. These...

Read MoreRead more about CISA: CISA Releases One Industrial Control Systems Advisory

Posts pagination

Previous 1 … 1,022 1,023 1,024 1,025 1,026 1,027 1,028 … 4,196 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4407

July 1, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6905

July 1, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6907

July 1, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6906

July 1, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel