Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Vulnerabilities

CVE Alert: CVE-2025-26626

March 15, 2025

Vulnerability Summary: CVE-2025-26626 The GLPI Inventory Plugin handles various types of tasks for GLPI agents for the GLPI asset and...

Read MoreRead more about CVE Alert: CVE-2025-26626
image
  • Vulnerabilities

CVE Alert: CVE-2024-45643

March 15, 2025

Vulnerability Summary: CVE-2024-45643 IBM Security QRadar 3.12 EDR uses weaker than expected cryptographic algorithms that could allow an attacker to...

Read MoreRead more about CVE Alert: CVE-2024-45643
image
  • Vulnerabilities

CVE Alert: CVE-2024-40590

March 15, 2025

Vulnerability Summary: CVE-2024-40590 An improper certificate validation vulnerability in FortiPortal version 7.4.0, version 7.2.4 and below, version 7.0.8 and below,...

Read MoreRead more about CVE Alert: CVE-2024-40590
image
  • Vulnerabilities

CVE Alert: CVE-2024-45638

March 15, 2025

Vulnerability Summary: CVE-2024-45638 IBM Security QRadar 3.12 EDR stores user credentials in plain text which can be read by a...

Read MoreRead more about CVE Alert: CVE-2024-45638
image
  • Vulnerabilities

CVE Alert: CVE-2024-46662

March 15, 2025

Vulnerability Summary: CVE-2024-46662 A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiManager versions 7.4.1...

Read MoreRead more about CVE Alert: CVE-2024-46662
image
  • Vulnerabilities

CVE Alert: CVE-2023-45588

March 15, 2025

Vulnerability Summary: CVE-2023-45588 An external control of file name or path vulnerability in FortiClientMac version 7.2.3 and below, version 7.0.10...

Read MoreRead more about CVE Alert: CVE-2023-45588
image
  • Vulnerabilities

CVE Alert: CVE-2024-47573

March 15, 2025

Vulnerability Summary: CVE-2024-47573 An improper validation of integrity check value vulnerability in FortiNDR version 7.4.2 and below, version 7.2.1 and...

Read MoreRead more about CVE Alert: CVE-2024-47573
image
  • Vulnerabilities

CVE Alert: CVE-2023-48785

March 15, 2025

Vulnerability Summary: CVE-2023-48785 An improper certificate validation vulnerability in FortiNAC-F version 7.2.4 and below may allow a remote and unauthenticated...

Read MoreRead more about CVE Alert: CVE-2023-48785
image
  • Vulnerabilities

CVE Alert: CVE-2023-33300

March 15, 2025

Vulnerability Summary: CVE-2023-33300 A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiNAC 7.2.1 and...

Read MoreRead more about CVE Alert: CVE-2023-33300
image
  • Vulnerabilities

CVE Alert: CVE-2022-29059

March 15, 2025

Vulnerability Summary: CVE-2022-29059 An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in FortiWeb version...

Read MoreRead more about CVE Alert: CVE-2022-29059
image
  • Vulnerabilities

CVE Alert: CVE-2025-1888

March 15, 2025

Vulnerability Summary: CVE-2025-1888 The Leica Web Viewer within the Aperio Eslide Manager Application is vulnerable to reflected cross-site scripting (XSS)....

Read MoreRead more about CVE Alert: CVE-2025-1888
image
  • Vulnerabilities

CVE Alert: CVE-2024-40585

March 15, 2025

Vulnerability Summary: CVE-2024-40585 An insertion of sensitive information into log file vulnerabilities in FortiManager version 7.4.0, version 7.2.3 and below,...

Read MoreRead more about CVE Alert: CVE-2024-40585
image
  • Vulnerabilities

CVE Alert: CVE-2025-27606

March 15, 2025

Vulnerability Summary: CVE-2025-27606 Element Android is an Android Matrix Client provided by Element. Element Android up to version 1.6.32 can,...

Read MoreRead more about CVE Alert: CVE-2025-27606
image
  • Vulnerabilities

CVE Alert: CVE-2024-55594

March 15, 2025

Vulnerability Summary: CVE-2024-55594 An improper handling of syntactically invalid structure in Fortinet FortiWeb at least vesrions 7.4.0 through 7.4.6 and...

Read MoreRead more about CVE Alert: CVE-2024-55594
image
  • Vulnerabilities

CVE Alert: CVE-2025-2309

March 15, 2025

Vulnerability Summary: CVE-2025-2309 A vulnerability has been found in HDF5 1.14.6 and classified as critical. This vulnerability affects the function...

Read MoreRead more about CVE Alert: CVE-2025-2309
image
  • Vulnerabilities

CVE Alert: CVE-2025-2310

March 15, 2025

Vulnerability Summary: CVE-2025-2310 A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup...

Read MoreRead more about CVE Alert: CVE-2025-2310
image
  • Vulnerabilities

CVE Alert: CVE-2025-2308

March 15, 2025

Vulnerability Summary: CVE-2025-2308 A vulnerability, which was classified as critical, was found in HDF5 1.14.6. This affects the function H5Z__scaleoffset_decompress_one_byte...

Read MoreRead more about CVE Alert: CVE-2025-2308
image
  • Vulnerabilities

CVE Alert: CVE-2025-2295

March 15, 2025

Vulnerability Summary: CVE-2025-2295 EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by...

Read MoreRead more about CVE Alert: CVE-2025-2295
image
  • Vulnerabilities

CVE Alert: CVE-2025-2320

March 15, 2025

Vulnerability Summary: CVE-2025-2320 A vulnerability has been found in 274056675 springboot-openai-chatgpt e84f6f5 and classified as critical. Affected by this vulnerability...

Read MoreRead more about CVE Alert: CVE-2025-2320
news
  • News
  • Premium Members Content

Collaboration Gaps in Cybersecurity: Insights from Former GCHQ Director

March 15, 2025

In today's increasingly protectionist global landscape, cybersecurity organizations need to enhance collaboration to combat escalating threats, as emphasized by Sir...

Read MoreRead more about Collaboration Gaps in Cybersecurity: Insights from Former GCHQ Director
news
  • News
  • Premium Members Content

Impersonation of Clop Ransomware: A New Extortion Tactic Targeting Businesses

March 15, 2025

Fraudsters are now impersonating the Clop ransomware gang, highlighting a concerning trend in business extortion tactics. Recent findings by researchers...

Read MoreRead more about Impersonation of Clop Ransomware: A New Extortion Tactic Targeting Businesses
news
  • News
  • Premium Members Content

LockBit Ransomware Developer Extradited to the US: What You Need to Know

March 15, 2025

In a significant move, US authorities have extradited Rostislav Panev, a dual national of Russia and Israel, on serious charges...

Read MoreRead more about LockBit Ransomware Developer Extradited to the US: What You Need to Know
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 35[.]157[.]161[.]202:443

March 15, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 35[.]157[.]161[.]202:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 172[.]93[.]46[.]40:80

March 15, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 172[.]93[.]46[.]40:80

Posts pagination

Previous 1 … 151 152 153 154 155 156 157 … 4,083 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 156[.]238[.]224[.]164:80

May 20, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 111[.]229[.]0[.]18:443

May 20, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4864

May 20, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4865

May 20, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4861

May 20, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel