Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CISA_Logo
  • CISA

CISA: Apple Releases Security Updates for Multiple Products

January 23, 2024

Apple Releases Security Updates for Multiple Products Apple has released security updates for iOS and iPadOS, macOS, Safari, watchOS, and tvOS....

Read MoreRead more about CISA: Apple Releases Security Updates for Multiple Products
CISA_Logo
  • CISA

CISA: CISA Releases Six Industrial Control Systems Advisories

January 23, 2024

CISA Releases Six Industrial Control Systems Advisories CISA released six Industrial Control Systems (ICS) advisories on January 23, 2024. These...

Read MoreRead more about CISA: CISA Releases Six Industrial Control Systems Advisories
ssh-1
  • News

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

January 23, 2024

Two malicious packages discovered on the npm package registry have been found to leverage GitHub to store Base64-encrypted SSH keys...

Read MoreRead more about Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
main
  • News

VexTrio: The Uber of Cybercrime – Brokering Malware for 60+ Affiliates

January 23, 2024

The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity known as VexTrio...

Read MoreRead more about VexTrio: The Uber of Cybercrime – Brokering Malware for 60+ Affiliates
Basta
  • Data Breach
  • Ransomware

Black Basta Ransomware Victim: agc[.]com

January 23, 2024

Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about Black Basta Ransomware Victim: agc[.]com
Basta
  • Data Breach
  • Ransomware

Black Basta Ransomware Victim: envea[.]global

January 23, 2024

Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about Black Basta Ransomware Victim: envea[.]global
alerts
  • News

Zero-Day Vulnerability in Apple Products

January 23, 2024

Apple has released security updates to address a zero-day vulnerability (CVE-2024-23222) in their products. The vulnerability is reportedly being actively...

Read MoreRead more about Zero-Day Vulnerability in Apple Products
jira
  • News

~40,000 Attacks in 3 Days: Critical Confluence RCE Under Active Exploitation

January 23, 2024

Malicious actors have begun to actively exploit a recently disclosed critical security flaw impacting Atlassian Confluence Data Center and Confluence...

Read MoreRead more about ~40,000 Attacks in 3 Days: Critical Confluence RCE Under Active Exploitation
cybercrime
  • News

BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail Time

January 23, 2024

Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release for his role as the...

Read MoreRead more about BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail Time
macos-2
  • News

“Activator” Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets

January 23, 2024

Cracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware capable of harvesting system information...

Read MoreRead more about “Activator” Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets
ddos-attacks
  • News

From Megabits to Terabits: Gcore Radar Warns of a New Era of DDoS Attacks

January 23, 2024

As we enter 2024, Gcore has released its latest Gcore Radar report, a twice-annual publication in which the company releases...

Read MoreRead more about From Megabits to Terabits: Gcore Radar Warns of a New Era of DDoS Attacks
CVE-prog
  • Vulnerabilities

Gluwa Creditcoin code execution | CVE-2024-22410

January 23, 2024

NAME__________Gluwa Creditcoin code executionPlatforms Affected:Gluwa Creditcoin 2.232.1-mainnetRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Gluwa Creditcoin could allow a local authenticated attacker to execute arbitrary...

Read MoreRead more about Gluwa Creditcoin code execution | CVE-2024-22410
CVE-prog
  • Vulnerabilities

FlyCms cross-site request forgery | CVE-2024-22817

January 23, 2024

NAME__________FlyCms cross-site request forgeryPlatforms Affected:Beijing Xinyuehu Technology FlyCms 1.0Risk Level:5.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________FlyCms is vulnerable to cross-site request forgery,...

Read MoreRead more about FlyCms cross-site request forgery | CVE-2024-22817
CVE-prog
  • Vulnerabilities

Lava Legends of IdleOn weak security |

January 23, 2024

NAME__________Lava Legends of IdleOn weak securityPlatforms Affected:Lava Legends of IdleOnRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Lava Legends of IdleOn could provide weaker than...

Read MoreRead more about Lava Legends of IdleOn weak security |
CVE-prog
  • Vulnerabilities

FlyCms cross-site request forgery | CVE-2024-22603

January 23, 2024

NAME__________FlyCms cross-site request forgeryPlatforms Affected:Beijing Xinyuehu Technology FlyCms 1.0Risk Level:4.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________FlyCms is vulnerable to cross-site request forgery,...

Read MoreRead more about FlyCms cross-site request forgery | CVE-2024-22603
CVE-prog
  • Vulnerabilities

FlyCms cross-site request forgery | CVE-2024-22601

January 23, 2024

NAME__________FlyCms cross-site request forgeryPlatforms Affected:Beijing Xinyuehu Technology FlyCms 1.0Risk Level:4.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________FlyCms is vulnerable to cross-site request forgery,...

Read MoreRead more about FlyCms cross-site request forgery | CVE-2024-22601
CVE-prog
  • Vulnerabilities

darkhttpd information disclosure | CVE-2024-23770

January 23, 2024

NAME__________darkhttpd information disclosurePlatforms Affected:darkhttpd darkhttpd 1.14Risk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________darkhttpd could allow a local authenticated attacker to obtain sensitive information, caused...

Read MoreRead more about darkhttpd information disclosure | CVE-2024-23770
CVE-prog
  • Vulnerabilities

Delta Electronics WPLSoft buffer overflow | CVE-2023-5130

January 23, 2024

NAME__________Delta Electronics WPLSoft buffer overflowPlatforms Affected:Delta Electronics WPLSoft 2.42.11Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Delta Electronics WPLSoft is vulnerable to a buffer overflow,...

Read MoreRead more about Delta Electronics WPLSoft buffer overflow | CVE-2023-5130
CVE-prog
  • Vulnerabilities

Explorer++ buffer overflow | CVE-2024-0645

January 23, 2024

NAME__________Explorer++ buffer overflowPlatforms Affected:Explorer++ Explorer++ 1.3.5.531Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Explorer++ is vulnerable to a buffer overflow, caused by improper bounds checking...

Read MoreRead more about Explorer++ buffer overflow | CVE-2024-0645
CVE-prog
  • Vulnerabilities

EFS Easy File Sharing FTP denial of service | CVE-2024-0736

January 23, 2024

NAME__________EFS Easy File Sharing FTP denial of servicePlatforms Affected:EFS Software Easy File Sharing FTP 3.6Risk Level:5.3Exploitability:Proof of ConceptConsequences:Denial of Service...

Read MoreRead more about EFS Easy File Sharing FTP denial of service | CVE-2024-0736
CVE-prog
  • Vulnerabilities

YASM denial of service | CVE-2023-51258

January 23, 2024

NAME__________YASM denial of servicePlatforms Affected:yasm yasm 1.3.0Risk Level:4Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________YASM is vulnerable to a denial of service, caused by...

Read MoreRead more about YASM denial of service | CVE-2023-51258
CVE-prog
  • Vulnerabilities

FlyCms cross-site request forgery | CVE-2024-22818

January 23, 2024

NAME__________FlyCms cross-site request forgeryPlatforms Affected:Beijing Xinyuehu Technology FlyCms 1.0Risk Level:5.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________FlyCms is vulnerable to cross-site request forgery,...

Read MoreRead more about FlyCms cross-site request forgery | CVE-2024-22818
CVE-prog
  • Vulnerabilities

Delta Electronics ISPSoft buffer overflow | CVE-2023-5131

January 23, 2024

NAME__________Delta Electronics ISPSoft buffer overflowPlatforms Affected:Delta Electronics ISPSoft 3.02.11Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Delta Electronics ISPSoft is vulnerable to a heap-based buffer...

Read MoreRead more about Delta Electronics ISPSoft buffer overflow | CVE-2023-5131
CVE-prog
  • Vulnerabilities

Stupid Simple CMS cross-site request forgery | CVE-2024-22715

January 23, 2024

NAME__________Stupid Simple CMS cross-site request forgeryPlatforms Affected:Stupid Simple CMS Stupid Simple CMS 1.2.4Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Stupid Simple CMS is vulnerable...

Read MoreRead more about Stupid Simple CMS cross-site request forgery | CVE-2024-22715

Posts pagination

Previous 1 … 1,783 1,784 1,785 1,786 1,787 1,788 1,789 … 4,513 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: Simon Property Group

November 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-12399 – alexreservations – Alex Reservations: Smart Restaurant Booking

November 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-12099 – academylms – Academy LMS – WordPress LMS Plugin for Complete eLearning Solution

November 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9334 – codesolz – Better Find and Replace – AI-Powered Suggestions

November 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-11967 – getwpfunnels – Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more

November 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel