Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing to Protect Your Digital Assets

July 25, 2025
PODCAST-Patreon
  • Offensive Security
  • Premium Members Content

[PODCAST] TruffleHog: Leaked Credential Discovery and Analysis

July 24, 2025
unlock_membership
  • Premium Members Content

Mastering SOAR Technology to Strengthen Cyber Defense

July 23, 2025
37322b4d-6610-4491-8ecb-1bb2d8e8840e
  • Premium Members Content

[Deep Research] Autonomous AI Adversaries: Inside the Rise of Vibe Hacking

July 22, 2025
unlock_membership
  • Premium Members Content

Securing Critical Infrastructure in the Digital Age

July 18, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image-1
  • Data Breach
  • Ransomware

8 Base Ransomware Victim: Tetrosyl Group Limited

February 7, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about 8 Base Ransomware Victim: Tetrosyl Group Limited
image-1
  • Data Breach
  • Ransomware

8 Base Ransomware Victim: Harinck

February 7, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about 8 Base Ransomware Victim: Harinck
image-1
  • Data Breach
  • Ransomware

8 Base Ransomware Victim: YRW Limited – Chartered Accountants

February 7, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about 8 Base Ransomware Victim: YRW Limited – Chartered Accountants
image
  • Data Breach
  • Ransomware

CACTUS Ransomware Victim: https://www[.]spbglobal[.]com/

February 7, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about CACTUS Ransomware Victim: https://www[.]spbglobal[.]com/
image
  • Data Breach
  • Ransomware

CACTUS Ransomware Victim: https://www[.]gocco[.]com/

February 7, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about CACTUS Ransomware Victim: https://www[.]gocco[.]com/
BianLian
  • Data Breach
  • Ransomware

BianLian Ransomware Victim: B&B Electric Inc

February 7, 2024

BianLian Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about BianLian Ransomware Victim: B&B Electric Inc
image-1
  • Data Breach
  • Ransomware

Abyss Ransomware Victim: deltron[.]com

February 7, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Abyss Ransomware Victim: deltron[.]com
Google_headpic
  • News

Google Says Spyware Vendors Behind Most Zero Days It Discovers

February 7, 2024

Commercial spyware vendors (CSV) were behind 80% of the zero-day vulnerabilities Google's Threat Analysis Group (TAG) discovered in 2023 and...

Read MoreRead more about Google Says Spyware Vendors Behind Most Zero Days It Discovers
Verizon-headpic
  • News

Verizon Insider Data Breach Hits Over 63 000 Employees

February 7, 2024

Verizon Communications is warning that an insider data breach impacts almost half its workforce, exposing sensitive employee information. Verizon is...

Read MoreRead more about Verizon Insider Data Breach Hits Over 63 000 Employees
53ec99fef9120d2b6ee1c3cc7599b03793b6ebb0a6333b75217c534d19256dee
  • News

Criminal Ip Asm A New Cybersecurity Listing On Microsoft Azure

February 7, 2024

AI SPERA, a leader in Cyber Threat Intelligence (CTI)-based solutions, today announced that Criminal IP ASM (Attack Surface Management) is...

Read MoreRead more about Criminal Ip Asm A New Cybersecurity Listing On Microsoft Azure
c67c17eda872fdd403458b4c4ceef23a0c0ff84067fc9436bd3fe238e8fd1057
  • News

Hackers Steal Data Of 2 Million In Sql Injection Xss Attacks

February 7, 2024

A threat group named 'ResumeLooters' has stolen the personal data of over two million job seekers after compromising 65 legitimate...

Read MoreRead more about Hackers Steal Data Of 2 Million In Sql Injection Xss Attacks
healthcare
  • News

Data Breach At French Healthcare Services Firm Puts Millions At Risk

February 7, 2024

French healthcare services firm Viamedis suffered a cyberattack that exposed the data of policyholders and healthcare professionals in the country....

Read MoreRead more about Data Breach At French Healthcare Services Firm Puts Millions At Risk
Hackers
  • News

Chinese Hackers Infect Dutch Military Network With Malware

February 7, 2024

A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the...

Read MoreRead more about Chinese Hackers Infect Dutch Military Network With Malware
a5cd9cdecc5c51e9bffd0fcdac0a7882937f90172fcd1549f757d3684ea2cb7d
  • News

Jetbrains Warns Of New Teamcity Auth Bypass Vulnerability

February 7, 2024

JetBrains urged customers today to patch their TeamCity On-Premises servers against a critical authentication bypass vulnerability that can let attackers...

Read MoreRead more about Jetbrains Warns Of New Teamcity Auth Bypass Vulnerability
news
  • News
  • Premium Members Content

US Cracks Down on Spyware with Visa Restrictions

February 7, 2024

The US will impose visa restrictions on individuals involved in the misuse of commercial spyware.Anthony Blinken, the US Secretary of...

Read MoreRead more about US Cracks Down on Spyware with Visa Restrictions
news
  • News
  • Premium Members Content

ResumeLooters Gang Raids Retail and Job Site Data

February 7, 2024

Security researchers have uncovered a major data theft campaign targeting users of employment agency and retail websites mainly in APAC.Dubbed...

Read MoreRead more about ResumeLooters Gang Raids Retail and Job Site Data
news
  • News
  • Premium Members Content

Malware-as-a-Service Now the Top Threat to Organizations

February 7, 2024

Malware-as-a-Service (MaaS) infections were the biggest threat to organizations in the second half of 2023, according to a new Darktrace...

Read MoreRead more about Malware-as-a-Service Now the Top Threat to Organizations
news
  • News
  • Premium Members Content

Meta’s Oversight Board Urges a Policy Change After a Fake Biden Video

February 7, 2024

A fake video showing US President Joe Biden inappropriately touching his adult granddaughter’s chest sparked calls for Meta to change...

Read MoreRead more about Meta’s Oversight Board Urges a Policy Change After a Fake Biden Video
news
  • News
  • Premium Members Content

Latest Ivanti Zero Day Exploited By Scores of IPs

February 7, 2024

A zero-day vulnerability disclosed by Ivanti last week is undergoing mass exploitation in the wild, according to the Shadowserver Foundation.The...

Read MoreRead more about Latest Ivanti Zero Day Exploited By Scores of IPs
news
  • News
  • Premium Members Content

Safer Internet Day: Two Million Brits Victims of Financial Identity Fraud

February 7, 2024

Nearly two million Brits may have had their identity stolen and used by fraudsters to open a financial account in...

Read MoreRead more about Safer Internet Day: Two Million Brits Victims of Financial Identity Fraud
ransomhouse-1
  • Data Breach
  • Ransomware

RansomHouse Ransomware Victim: Shipleys LLP

February 7, 2024

  RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about RansomHouse Ransomware Victim: Shipleys LLP
CISA_Logo
  • CISA

CISA: CISA Adds One Known Exploited Vulnerability to Catalog

February 7, 2024

CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA_Logo
  • CISA

CISA: Updated: New Software Updates and Mitigations to Defend Against Exploitation of Ivanti Connect Secure and Policy Secure Gateways

February 7, 2024

Updated: New Software Updates and Mitigations to Defend Against Exploitation of Ivanti Connect Secure and Policy Secure Gateways Note: CISA...

Read MoreRead more about CISA: Updated: New Software Updates and Mitigations to Defend Against Exploitation of Ivanti Connect Secure and Policy Secure Gateways
CISA_Logo
  • CISA

CISA: CISA Adds One Known Exploited Vulnerability to Catalog

February 7, 2024

CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds One Known Exploited Vulnerability to Catalog

Posts pagination

Previous 1 … 1,506 1,507 1,508 1,509 1,510 1,511 1,512 … 4,276 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

brute_ratel_c4
  • Brute Ratel C4

Brute Ratel C4 Detected – 2[.]37[.]23[.]207:9002

July 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46993

July 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46996

July 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8114

July 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47061

July 25, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel