Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Youke365 server-side request forgery | CVE-2024-0303

January 9, 2024

NAME__________Youke365 server-side request forgeryPlatforms Affected:Youke365 Youke365 1.5.3Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Youke365 is vulnerable to server-side request forgery, caused by a flaw...

Read MoreRead more about Youke365 server-side request forgery | CVE-2024-0303
CVE-prog
  • Vulnerabilities

GTKWave buffer overflow | CVE-2023-35955

January 9, 2024

NAME__________GTKWave buffer overflowPlatforms Affected:GTKWave GTKWave 3.3.115Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________GTKWave is vulnerable to a heap-based buffer overflow, caused by improper bounds...

Read MoreRead more about GTKWave buffer overflow | CVE-2023-35955
CVE-prog
  • Vulnerabilities

HCL DRYiCE MyXalytics open redirect | CVE-2023-50345

January 9, 2024

NAME__________HCL DRYiCE MyXalytics open redirectPlatforms Affected:HCL DRYiCE MyXalyticsRisk Level:3.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________HCL DRYiCE MyXalytics could allow a remote attacker to conduct...

Read MoreRead more about HCL DRYiCE MyXalytics open redirect | CVE-2023-50345
CVE-prog
  • Vulnerabilities

GTKWave code execution | CVE-2023-37445

January 9, 2024

NAME__________ GTKWave code executionPlatforms Affected:GTKWave GTKWave 3.3.115Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________GTKWave could allow a remote attacker to execute arbitrary code on...

Read MoreRead more about GTKWave code execution | CVE-2023-37445
CVE-prog
  • Vulnerabilities

HCL DRYiCE MyXalytics information disclosure | CVE-2023-50346

January 9, 2024

NAME__________HCL DRYiCE MyXalytics information disclosurePlatforms Affected:HCL DRYiCE MyXalyticsRisk Level:3.1Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________HCL DRYiCE MyXalytics could allow a remote attacker to obtain...

Read MoreRead more about HCL DRYiCE MyXalytics information disclosure | CVE-2023-50346
CVE-prog
  • Vulnerabilities

Youke365 server-side request forgery | CVE-2024-0304

January 9, 2024

NAME__________Youke365 server-side request forgeryPlatforms Affected:Youke365 Youke365 1.5.3Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Youke365 is vulnerable to server-side request forgery, caused by a flaw...

Read MoreRead more about Youke365 server-side request forgery | CVE-2024-0304
CVE-prog
  • Vulnerabilities

GTKWave integer overflow | CVE-2023-38650

January 9, 2024

NAME__________GTKWave integer overflowPlatforms Affected:GTKWave GTKWave 3.3.115Risk Level:7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________GTKWave could allow a remote attacker to execute arbitrary code on the...

Read MoreRead more about GTKWave integer overflow | CVE-2023-38650
CVE-prog
  • Vulnerabilities

Inis server-side request forgery | CVE-2024-0308

January 9, 2024

NAME__________Inis server-side request forgeryPlatforms Affected:Inis Inis 2.0.1 Inis Inis 2.0.0Risk Level:6.3Exploitability:UnprovenConsequences: DESCRIPTION__________Inis is vulnerable to server-side request forgery, caused by...

Read MoreRead more about Inis server-side request forgery | CVE-2024-0308
youtube
  • News

Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer

January 9, 2024

Threat actors are resorting to YouTube videos featuring content related to cracked software in order to entice users into downloading...

Read MoreRead more about Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer
loanDepot
  • News

Us Mortgage Lender Loandepot Confirms Ransomware Attack

January 9, 2024

​Leading U.S. mortgage lender loanDepot confirmed today that a cyber incident disclosed over the weekend was a ransomware attack that led...

Read MoreRead more about Us Mortgage Lender Loandepot Confirms Ransomware Attack
Authy
  • News

Twilio Will Ditch Its Authy Desktop 2fa App In August Goes Mobile Only

January 9, 2024

The Authy desktop apps for Windows, macOS, and Linux will be discontinued in August 2024, with the company recommending users...

Read MoreRead more about Twilio Will Ditch Its Authy Desktop 2fa App In August Goes Mobile Only
7c3c431bf63731326d6d332a4120f5d8d8c28a584382b385c5afddf81e072d19
  • News

Netgear Hyundai Latest X Accounts Hacked To Push Crypto Drainers

January 9, 2024

The official Netgear and Hyundai MEA Twitter/X accounts (together with over 160,000 followers) are the latest hijacked to push scams...

Read MoreRead more about Netgear Hyundai Latest X Accounts Hacked To Push Crypto Drainers
Toronto_Zoo
  • News

Toronto Zoo Ransomware Attack Had No Impact On Animal Wellbeing

January 9, 2024

Toronto Zoo, the largest zoo in Canada, says that a ransomware attack that hit its systems on early Friday had...

Read MoreRead more about Toronto Zoo Ransomware Attack Had No Impact On Animal Wellbeing
sea-turtle
  • News

Turkish Hackers Sea Turtle Expand Attacks To Dutch Isps Telcos

January 9, 2024

The Turkish state-backed cyber espionage group tracked as Sea Turtle has been carrying out multiple spying campaigns in the Netherlands, focusing...

Read MoreRead more about Turkish Hackers Sea Turtle Expand Attacks To Dutch Isps Telcos
c0d95d3b6cf26470afb8260660a72e256c1dbc65ccc8b162ff0101dcbeba58af
  • News

Capital Health Attack Claimed By Lockbit Ransomware Risk Of Data Leak

January 9, 2024

The LockBit ransomware operation has claimed responsibility for a November 2023 cyberattack on the Capital Health hospital network and threatens...

Read MoreRead more about Capital Health Attack Claimed By Lockbit Ransomware Risk Of Data Leak
9bfaad0f4e7dff9e0d8b463ca84e2af5004d493e3db172f63358255f250f9034
  • News

Securing Helpdesks From Hackers What We Can Learn From The Mgm Breach

January 9, 2024

In the wake of the MGM Resorts service desk hack, it's clear that organizations need to rethink their approach to...

Read MoreRead more about Securing Helpdesks From Hackers What We Can Learn From The Mgm Breach
news
  • News
  • Premium Members Content

Security Firm Certik’s Account Hijacked to Spread Crypto Drainer

January 9, 2024

A Web3 security vendor was tricked by a social media phishing attack which hijacked its account and enabled scammers to...

Read MoreRead more about Security Firm Certik’s Account Hijacked to Spread Crypto Drainer
news
  • News
  • Premium Members Content

Anti-Hezbollah Groups Hack Beirut Airport Screens

January 9, 2024

Beirut’s international airport faced a cyber-attack on Sunday, January 8, reportedly orchestrated by domestic anti-Hezbollah groups. The attack comes amid escalating...

Read MoreRead more about Anti-Hezbollah Groups Hack Beirut Airport Screens
news
  • News
  • Premium Members Content

Merck Settles With Insurers Over $700m NotPetya Claim

January 9, 2024

Merck has finally reached a settlement with its insurers after they had refused to pay out following the NotPetya campaign...

Read MoreRead more about Merck Settles With Insurers Over $700m NotPetya Claim
news
  • News
  • Premium Members Content

New Research: Tackling .NET Malware With Harmony Library

January 9, 2024

Security researchers have recently unveiled strategic insights into countering .NET malware through the innovative use of the Harmony library. The research,...

Read MoreRead more about New Research: Tackling .NET Malware With Harmony Library
news
  • News
  • Premium Members Content

North Korean Hackers Stole $600m in Crypto in 2023

January 9, 2024

North Korean hackers stole at least $600m in cryptocurrency in 2023, around a third of the total value of such...

Read MoreRead more about North Korean Hackers Stole $600m in Crypto in 2023
CISA_Logo
  • CISA

CISA: Apple Releases Security Updates for Multiple Products

January 9, 2024

Apple Releases Security Updates for Multiple Products Apple has released security updates to address vulnerabilities in Safari, iOS, iPadOS, and...

Read MoreRead more about CISA: Apple Releases Security Updates for Multiple Products
CISA_Logo
  • CISA

CISA: CISA Releases Seven Industrial Control Systems Advisories

January 9, 2024

CISA Releases Seven Industrial Control Systems Advisories CISA released seven Industrial Control Systems (ICS) advisories on December 19, 2023. These...

Read MoreRead more about CISA: CISA Releases Seven Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: CISA Releases Two Industrial Control Systems Advisories

January 9, 2024

CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on December 21, 2023. These...

Read MoreRead more about CISA: CISA Releases Two Industrial Control Systems Advisories

Posts pagination

Previous 1 … 1,731 1,732 1,733 1,734 1,735 1,736 1,737 … 4,415 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE – Unknown vendor – Unknown product

September 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10668 – itsourcecode – Online Discussion Forum

September 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10667 – itsourcecode – Online Discussion Forum

September 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10666 – D-Link – DIR-825

September 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8565 – wplegalpages – Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages

September 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel