Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
af33dbc4af9cb3fe5e497afd7363e6a4b5eb8f1da4c53879781a24e924ce9588
  • News

A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation

October 29, 2024

Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes...

Read MoreRead more about A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation
image
  • Vulnerabilities

CVE Alert: CVE-2024-50469

October 29, 2024

Vulnerability Summary: CVE-2024-50469 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Bright Vessel...

Read MoreRead more about CVE Alert: CVE-2024-50469
image
  • Vulnerabilities

CVE Alert: CVE-2024-50464

October 29, 2024

Vulnerability Summary: CVE-2024-50464 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex...

Read MoreRead more about CVE Alert: CVE-2024-50464
image
  • Vulnerabilities

CVE Alert: CVE-2024-50468

October 29, 2024

Vulnerability Summary: CVE-2024-50468 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Robinson Raptor...

Read MoreRead more about CVE Alert: CVE-2024-50468
image
  • Vulnerabilities

CVE Alert: CVE-2024-50467

October 29, 2024

Vulnerability Summary: CVE-2024-50467 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebXApp Scrollbar by...

Read MoreRead more about CVE Alert: CVE-2024-50467
image
  • Vulnerabilities

CVE Alert: CVE-2024-9629

October 29, 2024

Vulnerability Summary: CVE-2024-9629 The Contact Form 7 + Telegram plugin for WordPress is vulnerable to unauthorized modification of data and...

Read MoreRead more about CVE Alert: CVE-2024-9629
image
  • Vulnerabilities

CVE Alert: CVE-2024-50433

October 29, 2024

Vulnerability Summary: CVE-2024-50433 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wowDevs Sky Addons...

Read MoreRead more about CVE Alert: CVE-2024-50433
image
  • Vulnerabilities

CVE Alert: CVE-2024-50437

October 29, 2024

Vulnerability Summary: CVE-2024-50437 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AyeCode GeoDirectory allows...

Read MoreRead more about CVE Alert: CVE-2024-50437
image
  • Vulnerabilities

CVE Alert: CVE-2024-50429

October 29, 2024

Vulnerability Summary: CVE-2024-50429 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPBlockArt Magazine Blocks...

Read MoreRead more about CVE Alert: CVE-2024-50429
image
  • Vulnerabilities

CVE Alert: CVE-2024-50431

October 29, 2024

Vulnerability Summary: CVE-2024-50431 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Cloudways Breeze allows...

Read MoreRead more about CVE Alert: CVE-2024-50431
image
  • Vulnerabilities

CVE Alert: CVE-2024-50432

October 29, 2024

Vulnerability Summary: CVE-2024-50432 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Post Grid...

Read MoreRead more about CVE Alert: CVE-2024-50432
intel
  • News

New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors

October 29, 2024

More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found...

Read MoreRead more about New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors
white-house
  • News

U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing

October 29, 2024

The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the...

Read MoreRead more about U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing
image
  • Vulnerabilities

CVE Alert: CVE-2024-9825

October 29, 2024

Vulnerability Summary: CVE-2024-9825 The Chef Habitat builder-api on-prem-builder package with any version lower than habitat/builder-api/10315/20240913162802 is vulnerable to indirect object...

Read MoreRead more about CVE Alert: CVE-2024-9825
image
  • Vulnerabilities

CVE Alert: CVE-2024-50434

October 29, 2024

Vulnerability Summary: CVE-2024-50434 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme...

Read MoreRead more about CVE Alert: CVE-2024-50434
image
  • Vulnerabilities

CVE Alert: CVE-2024-50435

October 29, 2024

Vulnerability Summary: CVE-2024-50435 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme...

Read MoreRead more about CVE Alert: CVE-2024-50435
image
  • Vulnerabilities

CVE Alert: CVE-2024-50457

October 29, 2024

Vulnerability Summary: CVE-2024-50457 : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in...

Read MoreRead more about CVE Alert: CVE-2024-50457
image
  • Vulnerabilities

CVE Alert: CVE-2024-49755

October 29, 2024

Vulnerability Summary: CVE-2024-49755 Duende IdentityServer is an OpenID Connect and OAuth 2.x framework for ASP.NET Core. IdentityServer's local API authentication...

Read MoreRead more about CVE Alert: CVE-2024-49755
image
  • Vulnerabilities

CVE Alert: CVE-2024-50496

October 29, 2024

Vulnerability Summary: CVE-2024-50496 Unrestricted Upload of File with Dangerous Type vulnerability in Web and Print Design AR For WordPress allows...

Read MoreRead more about CVE Alert: CVE-2024-50496
image
  • Vulnerabilities

CVE Alert: CVE-2024-50453

October 29, 2024

Vulnerability Summary: CVE-2024-50453 Relative Path Traversal vulnerability in Webangon The Pack Elementor addons allows PHP Local File Inclusion.This issue affects...

Read MoreRead more about CVE Alert: CVE-2024-50453
image
  • Vulnerabilities

CVE Alert: CVE-2024-50436

October 29, 2024

Vulnerability Summary: CVE-2024-50436 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme...

Read MoreRead more about CVE Alert: CVE-2024-50436
image
  • Vulnerabilities

CVE Alert: CVE-2024-50495

October 29, 2024

Vulnerability Summary: CVE-2024-50495 Unrestricted Upload of File with Dangerous Type vulnerability in WidgiLabs Plugin Propagator allows Upload a Web Shell...

Read MoreRead more about CVE Alert: CVE-2024-50495
image
  • Vulnerabilities

CVE Alert: CVE-2024-30106

October 29, 2024

Vulnerability Summary: CVE-2024-30106 HCL Connections is vulnerable to an information disclosure vulnerability, due to an IBM WebSphere Application Server error,...

Read MoreRead more about CVE Alert: CVE-2024-30106
news
  • News
  • Premium Members Content

Manufacturers Targeted by Rising AI-Powered BEC Scams

October 29, 2024

Business Email Compromise (BEC) scams are increasingly targeting manufacturers, representing a significant portion of phishing attempts. Recent analysis reveals alarming...

Read MoreRead more about Manufacturers Targeted by Rising AI-Powered BEC Scams

Posts pagination

Previous 1 … 1,117 1,118 1,119 1,120 1,121 1,122 1,123 … 4,508 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-46784 – Entr’ouvert – Lasso

November 6, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46404 – Entr’ouvert – Lasso

November 6, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46705 – Entr’ouvert – Lasso

November 6, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]138[.]222[.]215:443

November 6, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]116[.]208[.]81:443

November 6, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel