Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Fortifying the Supply Chain through Practical Security for Modern Organizations

September 22, 2025
unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Data Breach
  • Ransomware

[RANSOMHUB] – Ransomware Victim: Fpapak[.]org

October 16, 2024

Ransomware Group: RANSOMHUB VICTIM NAME: Fpapakorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [RANSOMHUB] – Ransomware Victim: Fpapak[.]org
image
  • Vulnerabilities

CVE Alert: CVE-2024-21279

October 16, 2024

Vulnerability Summary: CVE-2024-21279 Vulnerability in the Oracle Sourcing product of Oracle E-Business Suite (component: Auctions). Supported versions that are affected...

Read MoreRead more about CVE Alert: CVE-2024-21279
image
  • Vulnerabilities

CVE Alert: CVE-2024-21280

October 16, 2024

Vulnerability Summary: CVE-2024-21280 Vulnerability in the Oracle Service Contracts product of Oracle E-Business Suite (component: Authoring). Supported versions that are...

Read MoreRead more about CVE Alert: CVE-2024-21280
image
  • Vulnerabilities

CVE Alert: CVE-2024-21278

October 16, 2024

Vulnerability Summary: CVE-2024-21278 Vulnerability in the Oracle Contract Lifecycle Management for Public Sector product of Oracle E-Business Suite (component: Award...

Read MoreRead more about CVE Alert: CVE-2024-21278
image
  • Vulnerabilities

CVE Alert: CVE-2024-21281

October 16, 2024

Vulnerability Summary: CVE-2024-21281 Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Infrastructure). The supported...

Read MoreRead more about CVE Alert: CVE-2024-21281
image
  • Vulnerabilities

CVE Alert: CVE-2024-21286

October 16, 2024

Vulnerability Summary: CVE-2024-21286 Vulnerability in the PeopleSoft Enterprise ELM Enterprise Learning Management product of Oracle PeopleSoft (component: Enterprise Learning Management)....

Read MoreRead more about CVE Alert: CVE-2024-21286
cisa
  • News

CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

October 16, 2024

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk...

Read MoreRead more about CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability
github
  • News

GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access

October 16, 2024

GitHub has released security updates for Enterprise Server (GHES) to address multiple issues, including a critical bug that could allow...

Read MoreRead more about GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access
image
  • Vulnerabilities

CVE Alert: CVE-2024-9594

October 16, 2024

Vulnerability Summary: CVE-2024-9594 A security issue was discovered in the Kubernetes Image Builder versions

Read MoreRead more about CVE Alert: CVE-2024-9594
image
  • Vulnerabilities

CVE Alert: CVE-2024-21284

October 16, 2024

Vulnerability Summary: CVE-2024-21284 Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Reports). The supported...

Read MoreRead more about CVE Alert: CVE-2024-21284
image
  • Vulnerabilities

CVE Alert: CVE-2024-31955

October 16, 2024

Vulnerability Summary: CVE-2024-31955 An issue was discovered in Samsung eMMC with KLMAG2GE4A and KLM8G1WEMB firmware. Code bypass through Electromagnetic Fault...

Read MoreRead more about CVE Alert: CVE-2024-31955
image
  • Vulnerabilities

CVE Alert: CVE-2024-21283

October 16, 2024

Vulnerability Summary: CVE-2024-21283 Vulnerability in the PeopleSoft Enterprise HCM Global Payroll Core product of Oracle PeopleSoft (component: Global Payroll for...

Read MoreRead more about CVE Alert: CVE-2024-21283
image
  • Vulnerabilities

CVE Alert: CVE-2024-21285

October 16, 2024

Vulnerability Summary: CVE-2024-21285 Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Reports). The supported...

Read MoreRead more about CVE Alert: CVE-2024-21285
image
  • Vulnerabilities

CVE Alert: CVE-2024-38204

October 16, 2024

Vulnerability Summary: CVE-2024-38204 Improper Access Control in Imagine Cup allows an authorized attacker to elevate privileges over a network. Affected...

Read MoreRead more about CVE Alert: CVE-2024-38204
image
  • Vulnerabilities

CVE Alert: CVE-2024-38190

October 16, 2024

Vulnerability Summary: CVE-2024-38190 Missing authorization in Power Platform allows an unauthenticated attacker to view sensitive information through a network attack...

Read MoreRead more about CVE Alert: CVE-2024-38190
image
  • Vulnerabilities

CVE Alert: CVE-2024-9486

October 16, 2024

Vulnerability Summary: CVE-2024-9486 A security issue was discovered in the Kubernetes Image Builder versions

Read MoreRead more about CVE Alert: CVE-2024-9486
image
  • Vulnerabilities

CVE Alert: CVE-2024-45085

October 16, 2024

Vulnerability Summary: CVE-2024-45085 IBM WebSphere Application Server 8.5 is vulnerable to a denial of service, under certain configurations, caused by...

Read MoreRead more about CVE Alert: CVE-2024-45085
image
  • Vulnerabilities

CVE Alert: CVE-2024-38139

October 16, 2024

Vulnerability Summary: CVE-2024-38139 Improper authentication in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network. Affected Endpoints:...

Read MoreRead more about CVE Alert: CVE-2024-38139
unlock_membership
  • Premium Members Content

Harnessing the Power of AI in Cybersecurity

October 16, 2024

Artificial intelligence (AI) is revolutionizing the cybersecurity landscape, providing innovative solutions to combat complex threats. As cyberattacks become more sophisticated,...

Read MoreRead more about Harnessing the Power of AI in Cybersecurity
image
  • Data Breach
  • Ransomware

[BIANLIAN] – Ransomware Victim: Lein Law Offices

October 16, 2024

Ransomware Group: BIANLIAN VICTIM NAME: Lein Law Offices NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [BIANLIAN] – Ransomware Victim: Lein Law Offices
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Nor-Well

October 16, 2024

Ransomware Group: PLAY VICTIM NAME: Nor-Well NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [PLAY] – Ransomware Victim: Nor-Well
image
  • Data Breach
  • Ransomware

[KILLSEC] – Ransomware Victim: moi[.]gov[.]ly

October 16, 2024

Ransomware Group: KILLSEC VICTIM NAME: moigovly NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [KILLSEC] – Ransomware Victim: moi[.]gov[.]ly
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: CETRULO

October 16, 2024

Ransomware Group: PLAY VICTIM NAME: CETRULO NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [PLAY] – Ransomware Victim: CETRULO
image
  • Data Breach
  • Ransomware

[BIANLIAN] – Ransomware Victim: Corporate Job Bank

October 16, 2024

Ransomware Group: BIANLIAN VICTIM NAME: Corporate Job Bank NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [BIANLIAN] – Ransomware Victim: Corporate Job Bank

Posts pagination

Previous 1 … 1,097 1,098 1,099 1,100 1,101 1,102 1,103 … 4,424 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-10585 – Google – Chrome

September 24, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47329 – Qualcomm, Inc. – Snapdragon

September 24, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47328 – Qualcomm, Inc. – Snapdragon

September 24, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47327 – Qualcomm, Inc. – Snapdragon

September 24, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47318 – Qualcomm, Inc. – Snapdragon

September 24, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel