Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Securing Critical Infrastructure in the Digital Age

July 18, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]43[.]94[.]35:180

June 4, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 101[.]43[.]94[.]35:180
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]100[.]168[.]4:8888

June 4, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 47[.]100[.]168[.]4:8888
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]109[.]201[.]173:8888

June 4, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 47[.]109[.]201[.]173:8888
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 124[.]222[.]81[.]106:8888

June 4, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 124[.]222[.]81[.]106:8888
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 106[.]75[.]244[.]12:8443

June 4, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 106[.]75[.]244[.]12:8443
image
  • Vulnerabilities

CVE Alert: CVE-2025-47272

June 4, 2025

Vulnerability Summary: CVE-2025-47272 The CE Phoenix eCommerce platform, starting in version 1.0.9.7 and prior to version 1.1.0.3, allowed logged-in users...

Read MoreRead more about CVE Alert: CVE-2025-47272
image
  • Vulnerabilities

CVE Alert: CVE-2025-5442

June 4, 2025

Vulnerability Summary: CVE-2025-5442 A vulnerability, which was classified as critical, has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000...

Read MoreRead more about CVE Alert: CVE-2025-5442
image
  • Vulnerabilities

CVE Alert: CVE-2025-47289

June 4, 2025

Vulnerability Summary: CVE-2025-47289 CE Phoenix is a free, open-source eCommerce platform. A stored cross-site scripting (XSS) vulnerability was discovered in...

Read MoreRead more about CVE Alert: CVE-2025-47289
image
  • Vulnerabilities

CVE Alert: CVE-2025-0073

June 4, 2025

Vulnerability Summary: CVE-2025-0073 Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU...

Read MoreRead more about CVE Alert: CVE-2025-0073
image
  • Vulnerabilities

CVE Alert: CVE-2025-3454

June 4, 2025

Vulnerability Summary: CVE-2025-3454 This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra...

Read MoreRead more about CVE Alert: CVE-2025-3454
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: Myer Auto

June 4, 2025

Ransomware Group: SAFEPAY VICTIM NAME: Myer Auto NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [SAFEPAY] – Ransomware Victim: Myer Auto
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: FLOE International

June 4, 2025

Ransomware Group: QILIN VICTIM NAME: FLOE International NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [QILIN] – Ransomware Victim: FLOE International
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: digitalwarroom[.]com

June 4, 2025

Ransomware Group: SAFEPAY VICTIM NAME: digitalwarroomcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [SAFEPAY] – Ransomware Victim: digitalwarroom[.]com
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: ochsinc[.]org[.]com

June 4, 2025

Ransomware Group: SAFEPAY VICTIM NAME: ochsincorgcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [SAFEPAY] – Ransomware Victim: ochsinc[.]org[.]com
image
  • Vulnerabilities

CVE Alert: CVE-2025-48955

June 4, 2025

Vulnerability Summary: CVE-2025-48955 Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions...

Read MoreRead more about CVE Alert: CVE-2025-48955
image
  • Vulnerabilities

CVE Alert: CVE-2025-48958

June 4, 2025

Vulnerability Summary: CVE-2025-48958 Froxlor is open source server administration software. Prior to version 2.2.6, an HTML Injection vulnerability in the...

Read MoreRead more about CVE Alert: CVE-2025-48958
image
  • Vulnerabilities

CVE Alert: CVE-2025-5441

June 4, 2025

Vulnerability Summary: CVE-2025-5441 A vulnerability classified as critical was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001....

Read MoreRead more about CVE Alert: CVE-2025-5441
image
  • Vulnerabilities

CVE Alert: CVE-2025-48957

June 4, 2025

Vulnerability Summary: CVE-2025-48957 AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions...

Read MoreRead more about CVE Alert: CVE-2025-48957
image
  • Vulnerabilities

CVE Alert: CVE-2025-5444

June 4, 2025

Vulnerability Summary: CVE-2025-5444 A vulnerability has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified...

Read MoreRead more about CVE Alert: CVE-2025-5444
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Sorter Construction

June 3, 2025

Ransomware Group: PLAY VICTIM NAME: Sorter Construction NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [PLAY] – Ransomware Victim: Sorter Construction
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Rochon

June 3, 2025

Ransomware Group: PLAY VICTIM NAME: Rochon NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [PLAY] – Ransomware Victim: Rochon
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: yahtec

June 3, 2025

Ransomware Group: LYNX VICTIM NAME: yahtec NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [LYNX] – Ransomware Victim: yahtec
image
  • Vulnerabilities

CVE Alert: CVE-2025-5443

June 3, 2025

Vulnerability Summary: CVE-2025-5443 A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and...

Read MoreRead more about CVE Alert: CVE-2025-5443
image
  • Vulnerabilities

CVE Alert: CVE-2025-5446

June 3, 2025

Vulnerability Summary: CVE-2025-5446 A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been...

Read MoreRead more about CVE Alert: CVE-2025-5446

Posts pagination

Previous 1 … 127 128 129 130 131 132 133 … 4,257 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: erniesinceresco[.]com

July 19, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 49[.]233[.]32[.]31:9443

July 19, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 103[.]171[.]35[.]26:9443

July 19, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 45[.]141[.]233[.]66:8080

July 19, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]216[.]80[.]229:9443

July 19, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel