Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Vulnerabilities

CVE Alert: CVE-2025-45314

August 14, 2025

Vulnerability Summary: CVE-2025-45314 A cross-site scripting (XSS) vulnerability in the /Calendar endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary...

Read MoreRead more about CVE Alert: CVE-2025-45314
image
  • Vulnerabilities

CVE Alert: CVE-2025-2937

August 14, 2025

Vulnerability Summary: CVE-2025-2937 An issue has been discovered in GitLab CE/EE affecting all versions from 13.2 before 18.0.6, 18.1 before...

Read MoreRead more about CVE Alert: CVE-2025-2937
image
  • Vulnerabilities

CVE Alert: CVE-2025-7739

August 14, 2025

Vulnerability Summary: CVE-2025-7739 An issue has been discovered in GitLab CE/EE affecting all versions from 18.2 before 18.2.2 that, under...

Read MoreRead more about CVE Alert: CVE-2025-7739
image
  • Vulnerabilities

CVE Alert: CVE-2025-8770

August 14, 2025

Vulnerability Summary: CVE-2025-8770 An issue has been discovered in GitLab EE affecting all versions from 18.0 prior to 18.0.6, 18.1...

Read MoreRead more about CVE Alert: CVE-2025-8770
image
  • Vulnerabilities

CVE Alert: CVE-2025-6186

August 14, 2025

Vulnerability Summary: CVE-2025-6186 An issue has been discovered in GitLab CE/EE affecting all versions from 18.1 before 18.1.4, and 18.2...

Read MoreRead more about CVE Alert: CVE-2025-6186
image
  • Vulnerabilities

CVE Alert: CVE-2025-50946

August 14, 2025

Vulnerability Summary: CVE-2025-50946 OS Command Injection in Olivetin 2025.4.22 Custom Themes via the ParseRequestURI function in service/internal/executor/arguments.go. Affected Endpoints: No...

Read MoreRead more about CVE Alert: CVE-2025-50946
image
  • Vulnerabilities

CVE Alert: CVE-2025-5819

August 14, 2025

Vulnerability Summary: CVE-2025-5819 An issue has been discovered in GitLab CE/EE affecting all versions from 15.7 before 17.11.6, 18.0 before...

Read MoreRead more about CVE Alert: CVE-2025-5819
image
  • Vulnerabilities

CVE Alert: CVE-2025-7734

August 14, 2025

Vulnerability Summary: CVE-2025-7734 An issue has been discovered in GitLab CE/EE affecting all versions from 14.2 before 18.0.6, 18.1 before...

Read MoreRead more about CVE Alert: CVE-2025-7734
image
  • Vulnerabilities

CVE Alert: CVE-2025-8920

August 14, 2025

Vulnerability Summary: CVE-2025-8920 A vulnerability was identified in Portabilis i-Diario 1.6. Affected by this vulnerability is an unknown functionality of...

Read MoreRead more about CVE Alert: CVE-2025-8920
image
  • Vulnerabilities

CVE Alert: CVE-2025-8919

August 14, 2025

Vulnerability Summary: CVE-2025-8919 A vulnerability was determined in Portabilis i-Diario up to 1.6. Affected is an unknown function of the...

Read MoreRead more about CVE Alert: CVE-2025-8919
image
  • Vulnerabilities

CVE Alert: CVE-2025-8921

August 14, 2025

Vulnerability Summary: CVE-2025-8921 A vulnerability has been found in code-projects Job Diary 1.0. Affected by this issue is some unknown...

Read MoreRead more about CVE Alert: CVE-2025-8921
image
  • Vulnerabilities

CVE Alert: CVE-2025-8754

August 14, 2025

Vulnerability Summary: CVE-2025-8754 Missing Authentication for Critical Function vulnerability in ABB ABB AbilityTM zenon.This issue affects ABB AbilityTM zenon: from...

Read MoreRead more about CVE Alert: CVE-2025-8754
image
  • Vulnerabilities

CVE Alert: CVE-2025-43989

August 14, 2025

Vulnerability Summary: CVE-2025-43989 The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0...

Read MoreRead more about CVE Alert: CVE-2025-43989
image
  • Vulnerabilities

CVE Alert: CVE-2025-45313

August 14, 2025

Vulnerability Summary: CVE-2025-45313 A cross-site scripting (XSS) vulnerability in the /tasks endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary...

Read MoreRead more about CVE Alert: CVE-2025-45313
image
  • Vulnerabilities

CVE Alert: CVE-2025-8922

August 14, 2025

Vulnerability Summary: CVE-2025-8922 A vulnerability was found in code-projects Job Diary 1.0. This affects an unknown part of the file...

Read MoreRead more about CVE Alert: CVE-2025-8922
image
  • Vulnerabilities

CVE Alert: CVE-2025-8923

August 14, 2025

Vulnerability Summary: CVE-2025-8923 A vulnerability was determined in code-projects Job Diary 1.0. This vulnerability affects unknown code of the file...

Read MoreRead more about CVE Alert: CVE-2025-8923
image
  • Vulnerabilities

CVE Alert: CVE-2025-8925

August 14, 2025

Vulnerability Summary: CVE-2025-8925 A vulnerability has been found in itsourcecode Sports Management System 1.0. Affected is an unknown function of...

Read MoreRead more about CVE Alert: CVE-2025-8925
image
  • Vulnerabilities

CVE Alert: CVE-2025-8924

August 14, 2025

Vulnerability Summary: CVE-2025-8924 A vulnerability was identified in Campcodes Online Water Billing System 1.0. This issue affects some unknown processing...

Read MoreRead more about CVE Alert: CVE-2025-8924
image
  • Vulnerabilities

CVE Alert: CVE-2025-8926

August 14, 2025

Vulnerability Summary: CVE-2025-8926 A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is...

Read MoreRead more about CVE Alert: CVE-2025-8926
image
  • Vulnerabilities

CVE Alert: CVE-2025-8928

August 14, 2025

Vulnerability Summary: CVE-2025-8928 A vulnerability was identified in code-projects Medical Store Management System 1.0. This affects an unknown part of...

Read MoreRead more about CVE Alert: CVE-2025-8928
image
  • Vulnerabilities

CVE Alert: CVE-2025-8927

August 14, 2025

Vulnerability Summary: CVE-2025-8927 A vulnerability was determined in mtons mblog up to 3.5.0. Affected by this issue is some unknown...

Read MoreRead more about CVE Alert: CVE-2025-8927
image
  • Vulnerabilities

CVE Alert: CVE-2025-8929

August 14, 2025

Vulnerability Summary: CVE-2025-8929 A vulnerability has been found in code-projects Medical Store Management System 1.0. This vulnerability affects unknown code...

Read MoreRead more about CVE Alert: CVE-2025-8929
image
  • Vulnerabilities

CVE Alert: CVE-2025-55194

August 14, 2025

Vulnerability Summary: CVE-2025-55194 Part-DB is an open source inventory management system for electronic components. Prior to version 1.17.3, any authenticated...

Read MoreRead more about CVE Alert: CVE-2025-55194
c4d3f1f7d2d0be816094bea9765aabe9c1c5ce82934d9bc27e8527f6cf97b599
  • News

Suetopia: Generative Ai Is A Lawsuit Waiting To Happen To Your Business

August 14, 2025

More and more US companies are using generative AI as a way to save money they might otherwise pay creative...

Read MoreRead more about Suetopia: Generative Ai Is A Lawsuit Waiting To Happen To Your Business

Posts pagination

Previous 1 … 160 161 162 163 164 165 166 … 4,504 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Elliott Tax Service

November 4, 2025
image
  • Data Breach
  • Ransomware

[RHYSIDA] – Ransomware Victim: Automated Logistics Systems

November 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Benda Grace Stulz

November 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Palacios Marine & Industrial

November 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: General Micro Systems

November 4, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel