Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Vulnerabilities

CVE Alert: CVE-2024-52976

May 2, 2025

Vulnerability Summary: CVE-2024-52976 Inclusion of functionality from an untrusted control sphere in Elastic Agent subprocess, osqueryd, allows local attackers to...

Read MoreRead more about CVE Alert: CVE-2024-52976
image
  • Vulnerabilities

CVE Alert: CVE-2024-11390

May 2, 2025

Vulnerability Summary: CVE-2024-11390 Unrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in...

Read MoreRead more about CVE Alert: CVE-2024-11390
image
  • Vulnerabilities

CVE Alert: CVE-2024-52979

May 2, 2025

Vulnerability Summary: CVE-2024-52979 Uncontrolled Resource Consumption in Elasticsearch while evaluating specifically crafted search templates with Mustache functions can lead to...

Read MoreRead more about CVE Alert: CVE-2024-52979
image
  • Vulnerabilities

CVE Alert: CVE-2025-25016

May 2, 2025

Vulnerability Summary: CVE-2025-25016 Unrestricted file upload in Kibana allows an authenticated attacker to compromise software integrity by uploading a crafted...

Read MoreRead more about CVE Alert: CVE-2025-25016
image
  • Vulnerabilities

CVE Alert: CVE-2024-11994

May 2, 2025

Vulnerability Summary: CVE-2024-11994 APM server logs could contain parts of the document body from a partially failed bulk index request....

Read MoreRead more about CVE Alert: CVE-2024-11994
image
  • Vulnerabilities

CVE Alert: CVE-2025-23254

May 2, 2025

Vulnerability Summary: CVE-2025-23254 NVIDIA TensorRT-LLM for any platform contains a vulnerability in python executor where an attacker may cause a...

Read MoreRead more about CVE Alert: CVE-2025-23254
image
  • Vulnerabilities

CVE Alert: CVE-2025-4173

May 2, 2025

Vulnerability Summary: CVE-2025-4173 A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability...

Read MoreRead more about CVE Alert: CVE-2025-4173
image
  • Vulnerabilities

CVE Alert: CVE-2025-23244

May 2, 2025

Vulnerability Summary: CVE-2025-23244 NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an unprivileged attacker to escalate...

Read MoreRead more about CVE Alert: CVE-2025-23244
image
  • Vulnerabilities

CVE Alert: CVE-2025-23246

May 2, 2025

Vulnerability Summary: CVE-2025-23246 NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin),...

Read MoreRead more about CVE Alert: CVE-2025-23246
image
  • Vulnerabilities

CVE Alert: CVE-2025-23245

May 2, 2025

Vulnerability Summary: CVE-2025-23245 NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin),...

Read MoreRead more about CVE Alert: CVE-2025-23245
51a7c32a9ac77f5fe6ea9d752b3561b15b51030c1f5e2f0b73c826799164c91d
  • News

Btw Windows Subsystem For Linux Officially Uses Arch Now

May 2, 2025

There have been unofficial versions for years, but Arch Linux is now officially on the menu for people using Windows...

Read MoreRead more about Btw Windows Subsystem For Linux Officially Uses Arch Now
0309d00b3b2477a6fe7305df4ec9d15d2ec0f33a2bf4847693d8689bc84d9d3d
  • News

‘i Guess Nasa Doesn’t Need Or Care About My Work Anymore’

May 2, 2025

NASA has excised former Space Shuttle manager Wayne Hale's blog from its website in a reminder that nothing is forever.NASA...

Read MoreRead more about ‘i Guess Nasa Doesn’t Need Or Care About My Work Anymore’
image
  • Data Breach
  • Ransomware

[DEVMAN] – Ransomware Victim: smvthailand[.]com

May 2, 2025

Ransomware Group: DEVMAN VICTIM NAME: smvthailandcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [DEVMAN] – Ransomware Victim: smvthailand[.]com
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

In today's digital landscape, cyber threats are more sophisticated than ever. Ethical hacking and penetration testing are crucial strategies that...

Read MoreRead more about Mastering Ethical Hacking and Penetration Testing for Cyber Defense
HIBP-Banner-1
  • Data Breach

TehetségKapu – 54,357 breached accounts

May 2, 2025

HIBP In March 2025, almost 55k records were breached from the Hungarian education office website TehetségKapu. The data was subsequently...

Read MoreRead more about TehetségKapu – 54,357 breached accounts
image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: Weil Construction, Inc

May 2, 2025

Ransomware Group: MEDUSA VICTIM NAME: Weil Construction, Inc NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [MEDUSA] – Ransomware Victim: Weil Construction, Inc
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: The Saint James Hospital Group

May 2, 2025

Ransomware Group: INCRANSOM VICTIM NAME: The Saint James Hospital Group NOTE: No files or stolen information are by RedPacket Security....

Read MoreRead more about [INCRANSOM] – Ransomware Victim: The Saint James Hospital Group
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: StudioVaiani

May 2, 2025

Ransomware Group: INCRANSOM VICTIM NAME: StudioVaiani NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [INCRANSOM] – Ransomware Victim: StudioVaiani
image
  • Data Breach
  • Ransomware

[SKIRA] – Ransomware Victim: Dedicated Web Consultants, Inc (USA) – dwcusa[.]com

May 2, 2025

Ransomware Group: SKIRA VICTIM NAME: Dedicated Web Consultants, Inc (USA) - dwcusacom NOTE: No files or stolen information are by...

Read MoreRead more about [SKIRA] – Ransomware Victim: Dedicated Web Consultants, Inc (USA) – dwcusa[.]com
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: cobbcounty

May 2, 2025

Ransomware Group: QILIN VICTIM NAME: cobbcounty NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: cobbcounty
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Marsicovetere & Levine Law Group

May 2, 2025

Ransomware Group: AKIRA VICTIM NAME: Marsicovetere & Levine Law Group NOTE: No files or stolen information are by RedPacket Security....

Read MoreRead more about [AKIRA] – Ransomware Victim: Marsicovetere & Levine Law Group
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: www[.]newseason[.]com

May 2, 2025

Ransomware Group: QILIN VICTIM NAME: wwwnewseasoncom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: www[.]newseason[.]com
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: MALAYSIA AIRPORTS HOLDINGS BERHAD Part 1 of data taken !!!

May 2, 2025

Ransomware Group: QILIN VICTIM NAME: MALAYSIA AIRPORTS HOLDINGS BERHAD Part 1 of data taken !!! NOTE: No files or stolen...

Read MoreRead more about [QILIN] – Ransomware Victim: MALAYSIA AIRPORTS HOLDINGS BERHAD Part 1 of data taken !!!
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: www[.]ancc[.]org

May 2, 2025

Ransomware Group: QILIN VICTIM NAME: wwwanccorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: www[.]ancc[.]org

Posts pagination

Previous 1 … 118 119 120 121 122 123 124 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel