Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CISA-1
  • News

Cisa Urges Software Devs To Weed Out Sql Injection Vulnerabilities

March 26, 2024

CISA and the FBI urged executives of technology manufacturing companies to prompt formal reviews of their organizations' software and implement mitigations to...

Read MoreRead more about Cisa Urges Software Devs To Weed Out Sql Injection Vulnerabilities
hkcert
  • HKCERT
  • News

F5 Products Denial of Service Vulnerability

March 26, 2024

A vulnerability was identified in F5 Products. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted...

Read MoreRead more about F5 Products Denial of Service Vulnerability
CISA_Logo
  • CISA

CISA: Cisco Releases Security Updates for IOS XR Software

March 26, 2024

Cisco Releases Security Updates for IOS XR Software Cisco released security updates to address vulnerabilities in Cisco IOS XR software....

Read MoreRead more about CISA: Cisco Releases Security Updates for IOS XR Software
CISA_Logo
  • CISA

CISA: CISA Releases Fifteen Industrial Control Systems Advisories

March 26, 2024

CISA Releases Fifteen Industrial Control Systems Advisories CISA released fifteen Industrial Control Systems (ICS) advisories on March 14, 2024. These...

Read MoreRead more about CISA: CISA Releases Fifteen Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: Repository for Software Attestation and Artifacts Now Live

March 26, 2024

Repository for Software Attestation and Artifacts Now Live Software producers who partner with the federal government can now upload their...

Read MoreRead more about CISA: Repository for Software Attestation and Artifacts Now Live
CISA_Logo
  • CISA

CISA: CISA and Partners Release Joint Fact Sheet for Leaders on PRC-sponsored Volt Typhoon Cyber Activity

March 26, 2024

CISA and Partners Release Joint Fact Sheet for Leaders on PRC-sponsored Volt Typhoon Cyber Activity Today, CISA, the National Security...

Read MoreRead more about CISA: CISA and Partners Release Joint Fact Sheet for Leaders on PRC-sponsored Volt Typhoon Cyber Activity
CISA_Logo
  • CISA

CISA: CISA Releases One Industrial Control Systems Advisory

March 26, 2024

CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on March 19, 2024. These...

Read MoreRead more about CISA: CISA Releases One Industrial Control Systems Advisory
CISA_Logo
  • CISA

CISA: CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques

March 26, 2024

CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques Today, CISA, the Federal Bureau of Investigation...

Read MoreRead more about CISA: CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques
CISA_Logo
  • CISA

CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities

March 26, 2024

CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities Today, CISA and the...

Read MoreRead more about CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities
CISA_Logo
  • CISA

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

March 26, 2024

CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA_Logo
  • CISA

CISA: CISA Releases One Industrial Control Systems Advisory

March 26, 2024

CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on March 21, 2024. These...

Read MoreRead more about CISA: CISA Releases One Industrial Control Systems Advisory
CISA_Logo
  • CISA

CISA: Ivanti Releases Security Updates for Neurons for ITSM and Standalone Sentry

March 26, 2024

Ivanti Releases Security Updates for Neurons for ITSM and Standalone Sentry Ivanti has released security advisories to address vulnerabilities in...

Read MoreRead more about CISA: Ivanti Releases Security Updates for Neurons for ITSM and Standalone Sentry
CISA_Logo
  • CISA

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

March 25, 2024

CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA_Logo
  • CISA

CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities

March 25, 2024

CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities Today, CISA and the...

Read MoreRead more about CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities
CVE-prog
  • Vulnerabilities

Umbraco Umbraco-CMS information disclosure | CVE-2024-28868

March 25, 2024

NAME__________Umbraco Umbraco-CMS information disclosurePlatforms Affected:Umbraco Umbraco-CMS 10.8.4Risk Level:3.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Umbraco Umbraco-CMS could allow a remote attacker to obtain sensitive information,...

Read MoreRead more about Umbraco Umbraco-CMS information disclosure | CVE-2024-28868
CVE-prog
  • Vulnerabilities

Broadcom, Microsoft and MikroTik products denial of service | CVE-2024-2169

March 25, 2024

NAME__________Broadcom, Microsoft and MikroTik products denial of servicePlatforms Affected:Broadcom DSL/PON/Wifi routers Microsoft Windows Deployment Services (WDS) MikroTik TFTP serviceRisk Level:7.5Exploitability:UnprovenConsequences:Denial...

Read MoreRead more about Broadcom, Microsoft and MikroTik products denial of service | CVE-2024-2169
CVE-prog
  • Vulnerabilities

Advantech WebAccess/SCADA SQL injection | CVE-2024-2453

March 25, 2024

NAME__________Advantech WebAccess/SCADA SQL injectionPlatforms Affected:Advantech WebAccess/SCADA 9.1.5URisk Level:6.4Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Advantech WebAccess/SCADA is vulnerable to SQL injection. A remote authenticated attacker...

Read MoreRead more about Advantech WebAccess/SCADA SQL injection | CVE-2024-2453
CVE-prog
  • Vulnerabilities

jupyterhub oauthenticator security bypass | CVE-2024-29033

March 25, 2024

NAME__________jupyterhub oauthenticator security bypassPlatforms Affected:JupyterHub OAuthenticator 16.2.0Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________jupyterhub oauthenticator could allow a attacker to bypass security restrictions, caused...

Read MoreRead more about jupyterhub oauthenticator security bypass | CVE-2024-29033
CVE-prog
  • Vulnerabilities

Qiskit IBM Runtime code execution | CVE-2024-29032

March 25, 2024

NAME__________Qiskit IBM Runtime code executionPlatforms Affected:Qiskit IBM Runtime 0.21.1Risk Level:5.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Qiskit IBM Runtime could allow a local authenticated attacker...

Read MoreRead more about Qiskit IBM Runtime code execution | CVE-2024-29032
CVE-prog
  • Vulnerabilities

Saleor Storefront information disclosure | CVE-2024-29036

March 25, 2024

NAME__________Saleor Storefront information disclosurePlatforms Affected:Saleor Storefront b5ce60693d9015a12d3001ea4a067a4fb037c14dRisk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Saleor Storefront could allow a remote attacker to obtain sensitive information,...

Read MoreRead more about Saleor Storefront information disclosure | CVE-2024-29036
CVE-prog
  • Vulnerabilities

moby information disclosure | CVE-2024-29018

March 25, 2024

NAME__________moby information disclosurePlatforms Affected:moby moby 25.0.0 moby moby 26.0.0-rc1 moby moby 23.0.10Risk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________moby could allow a remote attacker...

Read MoreRead more about moby information disclosure | CVE-2024-29018
CVE-prog
  • Vulnerabilities

isaacs node-tar denial of service | CVE-2024-28863

March 25, 2024

NAME__________isaacs node-tar denial of servicePlatforms Affected:isaacs node-tar 6.2.0Risk Level:6.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________isaacs node-tar is vulnerable to a denial of service,...

Read MoreRead more about isaacs node-tar denial of service | CVE-2024-28863
BianLian
  • Data Breach
  • Ransomware

BianLian Ransomware Victim: Bira 91

March 25, 2024

BianLian Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about BianLian Ransomware Victim: Bira 91
ea02f1507ae0a05e24fb80924bb4a9fe3722b095ea5fb5783b13dff4253ba775
  • News

Over 100 Us And Eu Orgs Targeted In Strelastealer Malware Attacks

March 25, 2024

A new large-scale StrelaStealer malware campaign has impacted over a hundred organizations across the United States and Europe, attempting to...

Read MoreRead more about Over 100 Us And Eu Orgs Targeted In Strelastealer Malware Attacks

Posts pagination

Previous 1 … 1,468 1,469 1,470 1,471 1,472 1,473 1,474 … 4,418 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 1[.]92[.]138[.]71:8080

September 20, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 118[.]25[.]91[.]151:80

September 20, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 117[.]72[.]105[.]10:8080

September 20, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]93[.]28[.]103:80

September 20, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]132[.]173[.]62:8001

September 20, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel