Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CISA_Logo
  • CISA

CISA: CISA Adds One Known Exploited Vulnerability to Catalog

January 17, 2024

CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CloudRecon
  • Tools

CloudRecon – Finding assets from certificates

January 16, 2024

CloudRecon Finding assets from certificates! Scan the web! Tool presented @DEFCON 31 Install ** You must have CGO enabled, and...

Read MoreRead more about CloudRecon – Finding assets from certificates
CISA_Logo
  • CISA

CISA: CISA Releases Two Industrial Control Systems Advisories

January 16, 2024

CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on January 16, 2024. These...

Read MoreRead more about CISA: CISA Releases Two Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: CISA and FBI Release Known IOCs Associated with Androxgh0st Malware

January 16, 2024

CISA and FBI Release Known IOCs Associated with Androxgh0st Malware Today, CISA and the Federal Bureau of Investigation (FBI) released...

Read MoreRead more about CISA: CISA and FBI Release Known IOCs Associated with Androxgh0st Malware
cyberattack-1
  • News

Remcos RAT Spreading Through Adult Games in New Attack Wave

January 16, 2024

The remote access trojan (RAT) known as Remcos RAT has been found being propagated via webhards by disguising it as...

Read MoreRead more about Remcos RAT Spreading Through Adult Games in New Attack Wave
exploit
  • News

Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits – Act Now

January 16, 2024

Over 178,000 SonicWall firewalls exposed over the internet are exploitable to at least one of the two security flaws that...

Read MoreRead more about Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits – Act Now
image-4
  • Data Breach
  • Ransomware

Akira Ransomware Victim: Bestway Sales

January 16, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Akira Ransomware Victim: Bestway Sales
image-4
  • Data Breach
  • Ransomware

Akira Ransomware Victim: TGS Transportation

January 16, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Akira Ransomware Victim: TGS Transportation
image-4
  • Data Breach
  • Ransomware

Akira Ransomware Victim: Premium Guard

January 16, 2024

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Akira Ransomware Victim: Premium Guard
cookie-1
  • News

Case Study: The Cookie Privacy Monster in Big Global Retail

January 16, 2024

Explore how an advanced exposure management solution saved a major retail industry client from ending up on the naughty step...

Read MoreRead more about Case Study: The Cookie Privacy Monster in Big Global Retail
drainer
  • News

Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims

January 16, 2024

The operators behind the now-defunct Inferno Drainer created more than 16,000 unique malicious domains over a span of one year...

Read MoreRead more about Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims
malware-3
  • News

Hackers Weaponize Windows Flaw to Deploy Crypto-Siphoning Phemedrone Stealer

January 16, 2024

Threat actors have been observed leveraging a now-patched security flaw in Microsoft Windows to deploy an open-source information stealer called...

Read MoreRead more about Hackers Weaponize Windows Flaw to Deploy Crypto-Siphoning Phemedrone Stealer
08432f878d53b73bba36a596e6dfddb26894dac8c39e899f41f2f8eb7ba92e8d
  • News

Us Court Docs Expose Fake Antivirus Renewal Phishing Tactics

January 16, 2024

In a seizure warrant application, the U.S. Secret Service sheds light on how threat actors stole $34,000 using fake antivirus...

Read MoreRead more about Us Court Docs Expose Fake Antivirus Renewal Phishing Tactics
4c6b5cdbfa83f3294e8e130a89a28d2ecbe022948a98adc47776d42a701d186e
  • News

Ivanti Connect Secure Zero Days Now Under Mass Exploitation

January 16, 2024

Two zero-day vulnerabilities affecting Ivanti's Connect Secure VPN and Policy Secure network access control (NAC) appliances are now under mass...

Read MoreRead more about Ivanti Connect Secure Zero Days Now Under Mass Exploitation
9a731b76b6478f52ef19c609d60258bb3c394f03ab5d254ddd17753a650de526
  • News

Latest Adblock Update Causes Massive Youtube Performance Hit

January 16, 2024

Adblock and Adblock Plus users report performance issues on YouTube, initially blamed on Google but later determined to be an...

Read MoreRead more about Latest Adblock Update Causes Massive Youtube Performance Hit
cbf56965eb57bde0eeacec4961b56847ccc778a1be53e20f4d9dbc1576d17785
  • News

Windows Smartscreen Flaw Exploited To Drop Phemedrone Malware

January 16, 2024

A Phemedrone information-stealing malware campaign exploits a Microsoft Defender SmartScreen vulnerability (CVE-2023-36025) to bypass Windows security prompts when opening URL...

Read MoreRead more about Windows Smartscreen Flaw Exploited To Drop Phemedrone Malware
90f514bbad0bc282a3bf642fc71d30854d30e6248fab1f3cb814e499c226e8d4
  • News

Over 178k Sonicwall Firewalls Vulnerable To Dos Potential Rce Attacks

January 16, 2024

Security researchers have found over 178,000 SonicWall next-generation firewalls (NGFW) with the management interface exposed online are vulnerable to denial-of-service...

Read MoreRead more about Over 178k Sonicwall Firewalls Vulnerable To Dos Potential Rce Attacks
news
  • News
  • Premium Members Content

Security Experts Urge IT to Lock Down GitHub Services

January 16, 2024

Threat intelligence firm Recorded Future has warned that threat actors are increasingly using GitHub services to launch covert cyber-attacks, and...

Read MoreRead more about Security Experts Urge IT to Lock Down GitHub Services
news
  • News
  • Premium Members Content

British Library Catalogue Back Online After Ransomware Attack

January 16, 2024

The British Library has begun restoring its online services as it continues to recover from last year’s ransomware attack.Sir Roly...

Read MoreRead more about British Library Catalogue Back Online After Ransomware Attack
news
  • News
  • Premium Members Content

HelloFresh Fined £140K After Sending 80 Million Spam Messages

January 16, 2024

Meal-kit company HelloFresh is the latest brand to receive a major fine from the UK’s privacy regulator, after it was...

Read MoreRead more about HelloFresh Fined £140K After Sending 80 Million Spam Messages
news
  • News
  • Premium Members Content

Environmental Websites Hit by DDoS Surge in COP28 Crossfire

January 16, 2024

The 28th United Nations Climate Change Conference (COP 28), held in Dubai at the end of 2023, sparked an “unprecedented...

Read MoreRead more about Environmental Websites Hit by DDoS Surge in COP28 Crossfire
news
  • News
  • Premium Members Content

Python-Based Tool FBot Disrupts Cloud Security

January 16, 2024

Security researchers have shed light on a new Python-based hacking tool, FBot, showcasing distinct features from other cloud malware families. Discovered...

Read MoreRead more about Python-Based Tool FBot Disrupts Cloud Security
news
  • News
  • Premium Members Content

Researchers Uncover Major Surge in Global Botnet Activity

January 16, 2024

Security researchers have discovered a significant increase in global botnet activity between December 2023 and the first week of January...

Read MoreRead more about Researchers Uncover Major Surge in Global Botnet Activity
news
  • News
  • Premium Members Content

Senators Demand Probe into SEC Hack After Bitcoin Price Spike

January 16, 2024

US lawmakers have demanded an investigation into the hack of the Securities and Exchange Commission (SEC)’s X (formerly Twitter) account...

Read MoreRead more about Senators Demand Probe into SEC Hack After Bitcoin Price Spike

Posts pagination

Previous 1 … 1,809 1,810 1,811 1,812 1,813 1,814 1,815 … 4,514 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Hitzinger

November 9, 2025
image
  • Data Breach
  • Ransomware

[HANDALA] – Ransomware Victim: Saturday Spotlight

November 9, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: SHRM New Mexico

November 9, 2025
74eda6cd0e3036cef36a28f8c3c0b4afb84a103178f846d07094cda1c3fd3d75
  • News

25 Years Of Meatbags Permanently In Space On The Iss

November 9, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Wasserverband Wulkatal

November 9, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel