Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CISA_Logo
  • CISA

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

April 2, 2024

CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA_Logo
  • CISA

CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities

April 2, 2024

CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities Today, CISA and the...

Read MoreRead more about CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities
CISA_Logo
  • CISA

CISA: CISA Adds One Known Exploited Vulnerability to Catalog

April 2, 2024

CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA_Logo
  • CISA

CISA: CISA Releases Four Industrial Control Systems Advisories

April 2, 2024

CISA Releases Four Industrial Control Systems Advisories CISA released four Industrial Control Systems (ICS) advisories on March 26, 2024. These...

Read MoreRead more about CISA: CISA Releases Four Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: Apple Released Security Updates for Safari and macOS

April 2, 2024

Apple Released Security Updates for Safari and macOS Apple released security updates to address a vulnerability (CVE-2024-1580) in Safari and macOS....

Read MoreRead more about CISA: Apple Released Security Updates for Safari and macOS
CISA_Logo
  • CISA

CISA: Cisco Releases Security Updates for Multiple Products

April 2, 2024

Cisco Releases Security Updates for Multiple Products Cisco released security updates to address vulnerabilities in Cisco IOS, IOS XE, and...

Read MoreRead more about CISA: Cisco Releases Security Updates for Multiple Products
CISA_Logo
  • CISA

CISA: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094

April 2, 2024

Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094 CISA and the open source community are responding to...

Read MoreRead more about CISA: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
Sliver-C2
  • SliverC2

Sliver C2 Detected – 103[.]27[.]186[.]143:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 103[.]27[.]186[.]143:31337
Sliver-C2
  • SliverC2

Sliver C2 Detected – 154[.]3[.]2[.]153:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 154[.]3[.]2[.]153:31337
Sliver-C2
  • SliverC2

Sliver C2 Detected – 141[.]98[.]11[.]40:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 141[.]98[.]11[.]40:31337
Sliver-C2
  • SliverC2

Sliver C2 Detected – 38[.]180[.]122[.]28:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 38[.]180[.]122[.]28:31337
Sliver-C2
  • SliverC2

Sliver C2 Detected – 51[.]75[.]17[.]249:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 51[.]75[.]17[.]249:31337
alerts
  • News

Multiple High Severity Vulnerabilities in Cisco IOS and IOS XE Software

April 1, 2024

Cisco has released updates addressing multiple high severity vulnerabilities (CVE-2024-20311, CVE-2024-20314, CVE-2024-20307, CVE-2024-20308, CVE-2024-20259, CVE-2024-20303) affecting their IOS and IOS...

Read MoreRead more about Multiple High Severity Vulnerabilities in Cisco IOS and IOS XE Software
Sliver-C2
  • SliverC2

Sliver C2 Detected – 38[.]92[.]40[.]83:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 38[.]92[.]40[.]83:31337
Sliver-C2
  • SliverC2

Sliver C2 Detected – 38[.]207[.]149[.]97:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 38[.]207[.]149[.]97:31337
Sliver-C2
  • SliverC2

Sliver C2 Detected – 154[.]12[.]91[.]189:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 154[.]12[.]91[.]189:31337
Sliver-C2
  • SliverC2

Sliver C2 Detected – 91[.]228[.]10[.]178:31337

April 1, 2024

The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...

Read MoreRead more about Sliver C2 Detected – 91[.]228[.]10[.]178:31337
CVE-prog
  • Vulnerabilities

IBM Security Verify Access Container information disclosure | CVE-2024-25027

April 1, 2024

NAME__________IBM Security Verify Access Container information disclosurePlatforms Affected:IBM Security Verify Access Docker 10.0.6Risk Level:6.2Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________IBM Security Verify Access 10.0.6...

Read MoreRead more about IBM Security Verify Access Container information disclosure | CVE-2024-25027
CVE-prog
  • Vulnerabilities

JetBrains TeamCity security bypass | CVE-2024-31140

April 1, 2024

NAME__________JetBrains TeamCity security bypassPlatforms Affected:JetBrains TeamCityRisk Level:4.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________JetBrains TeamCity could allow a remote authenticated attacker to bypass security restrictions,...

Read MoreRead more about JetBrains TeamCity security bypass | CVE-2024-31140
CVE-prog
  • Vulnerabilities

Elastic Elasticsearch information disclosure | CVE-2024-23451

April 1, 2024

NAME__________Elastic Elasticsearch information disclosurePlatforms Affected:Elastic Elasticsearch 8.10.0 Elastic Elasticsearch 8.12.0Risk Level:4.4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Elastic Elasticsearch could allow a remote authenticated attacker...

Read MoreRead more about Elastic Elasticsearch information disclosure | CVE-2024-23451
CVE-prog
  • Vulnerabilities

JetBrains TeamCity information disclosure | CVE-2024-31139

April 1, 2024

NAME__________JetBrains TeamCity information disclosurePlatforms Affected:JetBrains TeamCityRisk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________JetBrains TeamCity could allow a remote authenticated attacker to obtain sensitive information,...

Read MoreRead more about JetBrains TeamCity information disclosure | CVE-2024-31139
CVE-prog
  • Vulnerabilities

IBM WebSphere Application Server Liberty denial of service | CVE-2024-22353

April 1, 2024

NAME__________IBM WebSphere Application Server Liberty denial of servicePlatforms Affected:IBM WebSphere Application Server Liberty 17.0.0.3 IBM WebSphere Application Server Liberty 24.0.0.3Risk...

Read MoreRead more about IBM WebSphere Application Server Liberty denial of service | CVE-2024-22353
CVE-prog
  • Vulnerabilities

IBM Cloud Pak for Business Automation information disclosure | CVE-2023-50959

April 1, 2024

NAME__________IBM Cloud Pak for Business Automation information disclosurePlatforms Affected:IBM Cloud Pak for Business Automation 18.0.0 IBM Cloud Pak for Business...

Read MoreRead more about IBM Cloud Pak for Business Automation information disclosure | CVE-2023-50959
CVE-prog
  • Vulnerabilities

IBM CICS Transaction Gateway for Multiplatforms information disclosure | CVE-2023-50310

April 1, 2024

NAME__________IBM CICS Transaction Gateway for Multiplatforms information disclosurePlatforms Affected:IBM CICS Transaction Gateway for Multiplatforms 9.2 IBM CICS Transaction Gateway for...

Read MoreRead more about IBM CICS Transaction Gateway for Multiplatforms information disclosure | CVE-2023-50310

Posts pagination

Previous 1 … 1,449 1,450 1,451 1,452 1,453 1,454 1,455 … 4,417 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-7665 – cyberlord92 – Miniorange OTP Verification with Firebase

September 19, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10468 – Beyaz Computer – CityPlus

September 19, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9969 – Vizly Web Design – Real Estate Packages

September 19, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10712 – n/a – 07FLYCMS

September 19, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5955 – aonetheme – Service Finder SMS System

September 19, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel