Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Vulnerabilities

CVE Alert: CVE-2025-26169

May 8, 2025

Vulnerability Summary: CVE-2025-26169 IXON VPN Client before 1.4.4 on Windows allows Local Privilege Escalation to SYSTEM because there is code...

Read MoreRead more about CVE Alert: CVE-2025-26169
image
  • Vulnerabilities

CVE Alert: CVE-2025-26168

May 8, 2025

Vulnerability Summary: CVE-2025-26168 IXON VPN Client before 1.4.4 on Linux and macOS allows Local Privilege Escalation to root because there...

Read MoreRead more about CVE Alert: CVE-2025-26168
31cae46859538e4906235926eb81f8419e6f9b403412f20752d03e9a886a073d
  • Tools

API-s-for-OSINT – List Of API’s For Gathering Information About Phone Numbers, Addresses, Domains Etc

May 8, 2025

APIs For OSINT  This is a Collection of APIs that will be useful for automating various tasks in OSINT. Thank...

Read MoreRead more about API-s-for-OSINT – List Of API’s For Gathering Information About Phone Numbers, Addresses, Domains Etc
image
  • Vulnerabilities

CVE Alert: CVE-2023-7303

May 8, 2025

Vulnerability Summary: CVE-2023-7303 A vulnerability, which was classified as problematic, was found in q2apro q2apro-on-site-notifications up to 1.4.6. This affects...

Read MoreRead more about CVE Alert: CVE-2023-7303
image
  • Vulnerabilities

CVE Alert: CVE-2025-4043

May 8, 2025

Vulnerability Summary: CVE-2025-4043 An admin user can gain unauthorized write access to the /etc/rc.local file on the device, which is...

Read MoreRead more about CVE Alert: CVE-2025-4043
image
  • Vulnerabilities

CVE Alert: CVE-2025-31177

May 8, 2025

Vulnerability Summary: CVE-2025-31177 gnuplot is affected by a heap buffer overflow at function utf8_copy_one. Affected Endpoints: No affected endpoints listed....

Read MoreRead more about CVE Alert: CVE-2025-31177
image
  • Vulnerabilities

CVE Alert: CVE-2025-31644

May 8, 2025

Vulnerability Summary: CVE-2025-31644 When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP...

Read MoreRead more about CVE Alert: CVE-2025-31644
image
  • Vulnerabilities

CVE Alert: CVE-2025-36546

May 8, 2025

Vulnerability Summary: CVE-2025-36546 On an F5OS system, if the root user had previously configured the system to allow login via...

Read MoreRead more about CVE Alert: CVE-2025-36546
image
  • Vulnerabilities

CVE Alert: CVE-2025-36504

May 8, 2025

Vulnerability Summary: CVE-2025-36504 When a BIG-IP HTTP/2 httprouter profile is configured on a virtual server, undisclosed responses can cause an...

Read MoreRead more about CVE Alert: CVE-2025-36504
image
  • Vulnerabilities

CVE Alert: CVE-2025-36525

May 8, 2025

Vulnerability Summary: CVE-2025-36525 When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause...

Read MoreRead more about CVE Alert: CVE-2025-36525
image
  • Vulnerabilities

CVE Alert: CVE-2025-35995

May 8, 2025

Vulnerability Summary: CVE-2025-35995 When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an...

Read MoreRead more about CVE Alert: CVE-2025-35995
image
  • Vulnerabilities

CVE Alert: CVE-2025-41433

May 8, 2025

Vulnerability Summary: CVE-2025-41433 When a Session Initiation Protocol (SIP) message routing framework (MRF) application layer gateway (ALG) profile is configured...

Read MoreRead more about CVE Alert: CVE-2025-41433
image
  • Vulnerabilities

CVE Alert: CVE-2025-43878

May 8, 2025

Vulnerability Summary: CVE-2025-43878 When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be...

Read MoreRead more about CVE Alert: CVE-2025-43878
image
  • Data Breach
  • Ransomware

[EVEREST] – Ransomware Victim: Kaefer

May 8, 2025

Ransomware Group: EVEREST VICTIM NAME: Kaefer NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [EVEREST] – Ransomware Victim: Kaefer
image
  • Data Breach
  • Ransomware

[EVEREST] – Ransomware Victim: Khidmah

May 8, 2025

Ransomware Group: EVEREST VICTIM NAME: Khidmah NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [EVEREST] – Ransomware Victim: Khidmah
hkcert
  • HKCERT
  • News

Samsung Products Multiple Vulnerabilities

May 8, 2025

Multiple vulnerabilities were identified in Samsung Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...

Read MoreRead more about Samsung Products Multiple Vulnerabilities
b97e0a9bfd6825144cf658f74f4f8c58c343c04826f3d606479e40a3829ee827
  • News

Brain Inspired Neuromorphic Computer Spinnaker Overheated When Coolers Losttheir Chill

May 8, 2025

Exclusive The brain-inspired SpiNNaker machine at Manchester University in England suffered an overheating incident over the Easter weekend that will...

Read MoreRead more about Brain Inspired Neuromorphic Computer Spinnaker Overheated When Coolers Losttheir Chill
45baf80e1723f7ac88a8a5d5f3c40ee735f4cf45d372f37ba4aa65633e0ec624
  • News

Culture Comes First In Cybersecurity. That Puts Cybersecurity On The Front Linein The Culture Wars

May 8, 2025

Opinion It is a nation's first duty to protect its citizens from harm. A fine maxim, and one we can...

Read MoreRead more about Culture Comes First In Cybersecurity. That Puts Cybersecurity On The Front Linein The Culture Wars
782117d2300e872a2de954441bf7c9f9cc57b03e55c5892a13fe9991b2e48917
  • News

Linux Kernel To Drop 486 And Early 586 Support

May 8, 2025

Kernel 6.15 is taking shape and it looks like it will eliminate support for Intel's 486 chip and its contemporaries.The...

Read MoreRead more about Linux Kernel To Drop 486 And Early 586 Support
4f39dd12c4063e564b4373620c342724c722d456f8cd03807a8ceeae496fe0dd
  • News

Curl Project Founder Snaps Over Deluge Of Time Sucking Ai Slop Bug Reports

May 8, 2025

Curl project founder Daniel Stenberg is fed up with of the deluge of AI-generated "slop" bug reports and recently introduced...

Read MoreRead more about Curl Project Founder Snaps Over Deluge Of Time Sucking Ai Slop Bug Reports
image
  • Vulnerabilities

CVE Alert: CVE-2025-41399

May 8, 2025

Vulnerability Summary: CVE-2025-41399 When a Stream Control Transmission Protocol (SCTP) profile is configured on a virtual server, undisclosed requests can...

Read MoreRead more about CVE Alert: CVE-2025-41399
image
  • Vulnerabilities

CVE Alert: CVE-2025-41414

May 8, 2025

Vulnerability Summary: CVE-2025-41414 When HTTP/2 client and server profile is configured on a virtual server, undisclosed requests can cause TMM...

Read MoreRead more about CVE Alert: CVE-2025-41414
image
  • Vulnerabilities

CVE Alert: CVE-2025-41431

May 8, 2025

Vulnerability Summary: CVE-2025-41431 When connection mirroring is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel...

Read MoreRead more about CVE Alert: CVE-2025-41431
image
  • Vulnerabilities

CVE Alert: CVE-2025-36557

May 8, 2025

Vulnerability Summary: CVE-2025-36557 When an HTTP profile with the Enforce RFC Compliance option is configured on a virtual server, undisclosed...

Read MoreRead more about CVE Alert: CVE-2025-36557

Posts pagination

Previous 1 … 13 14 15 16 17 18 19 … 4,076 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]92[.]216[.]212:8080

May 15, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 193[.]124[.]41[.]54:80

May 15, 2025
brute_ratel_c4
  • Brute Ratel C4

Brute Ratel C4 Detected – 18[.]181[.]128[.]244:80

May 15, 2025
hkcert
  • HKCERT
  • News

Google Chrome Multiple Vulnerabilities

May 15, 2025
venera-8
  • News

After More Than Half A Century, The Voyage Of Kosmos 482 Is Over

May 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel