Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Fortifying the Supply Chain through Practical Security for Modern Organizations

September 22, 2025
unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
russia
  • News

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

October 19, 2024

A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses...

Read MoreRead more about Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks
main
  • News

Acronym Overdose – Navigating the Complex Data Security Landscape

October 19, 2024

In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others....

Read MoreRead more about Acronym Overdose – Navigating the Complex Data Security Landscape
image
  • Vulnerabilities

CVE Alert: CVE-2024-49243

October 19, 2024

Vulnerability Summary: CVE-2024-49243 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Jon...

Read MoreRead more about CVE Alert: CVE-2024-49243
image
  • Vulnerabilities

CVE Alert: CVE-2024-9674

October 19, 2024

Vulnerability Summary: CVE-2024-9674 The Debrandify · Remove or Replace WordPress Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting...

Read MoreRead more about CVE Alert: CVE-2024-9674
image
  • Vulnerabilities

CVE Alert: CVE-2024-49241

October 19, 2024

Vulnerability Summary: CVE-2024-49241 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tady Walsh Tito...

Read MoreRead more about CVE Alert: CVE-2024-49241
image
  • Vulnerabilities

CVE Alert: CVE-2024-47240

October 19, 2024

Vulnerability Summary: CVE-2024-47240 Dell Secure Connect Gateway (SCG) 5.24 contains an Incorrect Default Permissions vulnerability. A local attacker with low...

Read MoreRead more about CVE Alert: CVE-2024-47240
image
  • Vulnerabilities

CVE Alert: CVE-2024-43300

October 19, 2024

Vulnerability Summary: CVE-2024-43300 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bert Kößler Movie...

Read MoreRead more about CVE Alert: CVE-2024-43300
image
  • Vulnerabilities

CVE Alert: CVE-2024-9593

October 19, 2024

Vulnerability Summary: CVE-2024-9593 The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution...

Read MoreRead more about CVE Alert: CVE-2024-9593
image
  • Vulnerabilities

CVE Alert: CVE-2024-10120

October 19, 2024

Vulnerability Summary: CVE-2024-10120 A vulnerability has been found in wfh45678 Radar up to 1.0.8 and classified as critical. This vulnerability...

Read MoreRead more about CVE Alert: CVE-2024-10120
image
  • Vulnerabilities

CVE Alert: CVE-2024-9537

October 19, 2024

Vulnerability Summary: CVE-2024-9537 ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with...

Read MoreRead more about CVE Alert: CVE-2024-9537
image
  • Vulnerabilities

CVE Alert: CVE-2024-48016

October 19, 2024

Vulnerability Summary: CVE-2024-48016 Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken...

Read MoreRead more about CVE Alert: CVE-2024-48016
image
  • Vulnerabilities

CVE Alert: CVE-2024-47241

October 19, 2024

Vulnerability Summary: CVE-2024-47241 Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains an Improper Certificate Validation vulnerability....

Read MoreRead more about CVE Alert: CVE-2024-47241
image
  • Data Breach
  • Ransomware

[SARCOMA] – Ransomware Victim: Open Range Field Services

October 19, 2024

Ransomware Group: SARCOMA VICTIM NAME: Open Range Field Services NOTE: No files or stolen information are by RedPacket Security. Any...

Read MoreRead more about [SARCOMA] – Ransomware Victim: Open Range Field Services
image
  • Data Breach
  • Ransomware

[SARCOMA] – Ransomware Victim: Zierick Manufacturing Corporation

October 19, 2024

Ransomware Group: SARCOMA VICTIM NAME: Zierick Manufacturing Corporation NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [SARCOMA] – Ransomware Victim: Zierick Manufacturing Corporation
image
  • Data Breach
  • Ransomware

[SARCOMA] – Ransomware Victim: Pheim Unit Trusts Berhad

October 19, 2024

Ransomware Group: SARCOMA VICTIM NAME: Pheim Unit Trusts Berhad NOTE: No files or stolen information are by RedPacket Security. Any...

Read MoreRead more about [SARCOMA] – Ransomware Victim: Pheim Unit Trusts Berhad
image
  • Vulnerabilities

CVE Alert: CVE-2024-10128

October 19, 2024

Vulnerability Summary: CVE-2024-10128 A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been rated as problematic....

Read MoreRead more about CVE Alert: CVE-2024-10128
image
  • Vulnerabilities

CVE Alert: CVE-2024-10122

October 19, 2024

Vulnerability Summary: CVE-2024-10122 A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been classified as problematic....

Read MoreRead more about CVE Alert: CVE-2024-10122
image
  • Vulnerabilities

CVE Alert: CVE-2024-10121

October 19, 2024

Vulnerability Summary: CVE-2024-10121 A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects...

Read MoreRead more about CVE Alert: CVE-2024-10121
image
  • Vulnerabilities

CVE Alert: CVE-2024-10123

October 19, 2024

Vulnerability Summary: CVE-2024-10123 A vulnerability was found in Tenda AC8 16.03.34.06. It has been declared as critical. Affected by this...

Read MoreRead more about CVE Alert: CVE-2024-10123
image
  • Vulnerabilities

CVE Alert: CVE-2024-10130

October 19, 2024

Vulnerability Summary: CVE-2024-10130 A vulnerability classified as critical was found in Tenda AC8 16.03.34.06. This vulnerability affects the function formSetRebootTimer...

Read MoreRead more about CVE Alert: CVE-2024-10130
image
  • Vulnerabilities

CVE Alert: CVE-2024-37404

October 19, 2024

Vulnerability Summary: CVE-2024-37404 Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti...

Read MoreRead more about CVE Alert: CVE-2024-37404
image
  • Vulnerabilities

CVE Alert: CVE-2024-29821

October 19, 2024

Vulnerability Summary: CVE-2024-29821 Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated...

Read MoreRead more about CVE Alert: CVE-2024-29821
image
  • Vulnerabilities

CVE Alert: CVE-2024-43577

October 19, 2024

Vulnerability Summary: CVE-2024-43577 Microsoft Edge (Chromium-based) Spoofing Vulnerability Affected Endpoints: No affected endpoints listed. Published Date: 10/18/2024, 11:15:06 PM ⚠️...

Read MoreRead more about CVE Alert: CVE-2024-43577
image
  • Vulnerabilities

CVE Alert: CVE-2024-29213

October 19, 2024

Vulnerability Summary: CVE-2024-29213 Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated...

Read MoreRead more about CVE Alert: CVE-2024-29213

Posts pagination

Previous 1 … 1,080 1,081 1,082 1,083 1,084 1,085 1,086 … 4,423 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]242[.]129[.]79:9443

September 24, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]100[.]168[.]4:8888

September 24, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 81[.]69[.]98[.]230:50010

September 24, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]138[.]0[.]179:9443

September 24, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 119[.]45[.]29[.]172:8089

September 24, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel