Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CISA_Logo
  • CISA

CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog

January 6, 2024

CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA_Logo
  • CISA

CISA: Juniper Releases Security Advisory for Juniper Secure Analytics

January 6, 2024

Juniper Releases Security Advisory for Juniper Secure Analytics Juniper released a security advisory to address multiple vulnerabilities affecting Juniper Secure...

Read MoreRead more about CISA: Juniper Releases Security Advisory for Juniper Secure Analytics
CISA_Logo
  • CISA

CISA: CISA Releases Three Industrial Control Systems Advisories

January 6, 2024

CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on January 4, 2024. These...

Read MoreRead more about CISA: CISA Releases Three Industrial Control Systems Advisories
439f9ed3719d64a2097d01105212bf522f1f1e4f6168fe58f7beac2cfe1ce267
  • Tools

D3m0n1z3dShell – Demonized Shell Is An Advanced Tool For Persistence In Linux

January 5, 2024

Demonized Shell is an Advanced Tool for persistence in linux. Install git clone https://github.com/MatheuZSecurity/D3m0n1z3dShell.gitcd D3m0n1z3dShellchmod +x demonizedshell.shsudo ./demonizedshell.sh One-Liner Install...

Read MoreRead more about D3m0n1z3dShell – Demonized Shell Is An Advanced Tool For Persistence In Linux
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: b-the-taint-flag-is-not-propagated-at-json-parse-b-ooooooo-q

January 5, 2024

Company Name: b'Ruby' Company HackerOne URL: https://hackerone.com/ruby Submitted By:b'ooooooo_q'Link to Submitters Profile:https://hackerone.com/b'ooooooo_q' Report Title:b'The taint flag is not propagated at...

Read MoreRead more about HackerOne Bug Bounty Disclosure: b-the-taint-flag-is-not-propagated-at-json-parse-b-ooooooo-q
apple
  • News

SpectralBlur: New macOS Backdoor Threat from North Korean Hackers

January 5, 2024

Cybersecurity researchers have discovered a new Apple macOS backdoor called SpectralBlur that overlaps with a known malware family that has...

Read MoreRead more about SpectralBlur: New macOS Backdoor Threat from North Korean Hackers
orange
  • News

Orange Spain Faces BGP Traffic Hijack After RIPE Account Hacked by Malware

January 5, 2024

Mobile network operator Orange Spain suffered an internet outage for several hours on January 3 after a threat actor used...

Read MoreRead more about Orange Spain Faces BGP Traffic Hijack After RIPE Account Hacked by Malware
entro
  • News

Exposed Secrets are Everywhere. Here’s How to Tackle Them

January 5, 2024

Picture this: you stumble upon a concealed secret within your company's source code. Instantly, a wave of panic hits as...

Read MoreRead more about Exposed Secrets are Everywhere. Here’s How to Tackle Them
CVE-prog
  • Vulnerabilities

S-CMS /member/ad.php?action=ad SQL injection | CVE-2023-7190

January 5, 2024

NAME__________S-CMS /member/ad.php?action=ad SQL injectionPlatforms Affected:S-CMS S-CMS 2.0_build20220529-20231006Risk Level:5.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________S-CMS is vulnerable to SQL injection. A remote authenticated attacker could...

Read MoreRead more about S-CMS /member/ad.php?action=ad SQL injection | CVE-2023-7190
CVE-prog
  • Vulnerabilities

OpenHarmony denial of service | CVE-2023-49135

January 5, 2024

NAME__________OpenHarmony denial of servicePlatforms Affected:Risk Level:4Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________OpenHarmony is vulnerable to a denial of service. By using a modified...

Read MoreRead more about OpenHarmony denial of service | CVE-2023-49135
CVE-prog
  • Vulnerabilities

WebCalendar colors.php cross-site scripting |

January 5, 2024

NAME__________WebCalendar colors.php cross-site scriptingPlatforms Affected:Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________WebCalendar is vulnerable to cross-site scripting, caused by improper validation of user-supplied input...

Read MoreRead more about WebCalendar colors.php cross-site scripting |
CVE-prog
  • Vulnerabilities

OpenHarmony denial of service | CVE-2023-47216

January 5, 2024

NAME__________OpenHarmony denial of servicePlatforms Affected:Risk Level:2.9Exploitability:Consequences:Denial of Service DESCRIPTION__________OpenHarmony is vulnerable to a denial of service. By occupying all resources,...

Read MoreRead more about OpenHarmony denial of service | CVE-2023-47216
CVE-prog
  • Vulnerabilities

S-CMS member/reg.php SQL injection | CVE-2023-7191

January 5, 2024

NAME__________S-CMS member/reg.php SQL injectionPlatforms Affected:S-CMS S-CMS 2.0_build20220529-20231006Risk Level:5.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________S-CMS is vulnerable to SQL injection. A remote authenticated attacker could...

Read MoreRead more about S-CMS member/reg.php SQL injection | CVE-2023-7191
CVE-prog
  • Vulnerabilities

Microsoft Windows Kernel information disclosure |

January 5, 2024

NAME__________Microsoft Windows Kernel information disclosurePlatforms Affected:Risk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Microsoft Windows could allow a local authenticated attacker to obtain sensitive information,...

Read MoreRead more about Microsoft Windows Kernel information disclosure |
CVE-prog
  • Vulnerabilities

FlyCms cross-site scripting | CVE-2024-21732

January 5, 2024

NAME__________FlyCms cross-site scriptingPlatforms Affected:Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________FlyCms is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by...

Read MoreRead more about FlyCms cross-site scripting | CVE-2024-21732
CVE-prog
  • Vulnerabilities

Wireshark denial of service | CVE-2024-0209

January 5, 2024

NAME__________Wireshark denial of servicePlatforms Affected:Wireshark Wireshark 4.2.0Risk Level:6.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Wireshark is vulnerable to a denial of service, caused by...

Read MoreRead more about Wireshark denial of service | CVE-2024-0209
CVE-prog
  • Vulnerabilities

OpenHarmony denial of service | CVE-2023-49142

January 5, 2024

NAME__________OpenHarmony denial of servicePlatforms Affected:Risk Level:4Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________OpenHarmony is vulnerable to a denial of service. By using a modified...

Read MoreRead more about OpenHarmony denial of service | CVE-2023-49142
CVE-prog
  • Vulnerabilities

MapPress Maps for WordPress plugin for WordPress cross-site scripting | CVE-2023-6524

January 5, 2024

NAME__________MapPress Maps for WordPress plugin for WordPress cross-site scriptingPlatforms Affected:WordPress MapPress Maps for WordPress plugin for WordPress 2.88.13Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting...

Read MoreRead more about MapPress Maps for WordPress plugin for WordPress cross-site scripting | CVE-2023-6524
CVE-prog
  • Vulnerabilities

WebCalendar datesel.php cross-site scripting |

January 5, 2024

NAME__________WebCalendar datesel.php cross-site scriptingPlatforms Affected:Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________WebCalendar is vulnerable to cross-site scripting, caused by improper validation of user-supplied input...

Read MoreRead more about WebCalendar datesel.php cross-site scripting |
CVE-prog
  • Vulnerabilities

WebCalendar availability.php cross-site scripting |

January 5, 2024

NAME__________WebCalendar availability.php cross-site scriptingPlatforms Affected:Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________WebCalendar is vulnerable to cross-site scripting, caused by improper validation of user-supplied input...

Read MoreRead more about WebCalendar availability.php cross-site scripting |
CVE-prog
  • Vulnerabilities

Kofax Power PDF code execution | CVE-2023-51569

January 5, 2024

NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...

Read MoreRead more about Kofax Power PDF code execution | CVE-2023-51569
CVE-prog
  • Vulnerabilities

Kofax Power PDF code execution | CVE-2023-51563

January 5, 2024

NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...

Read MoreRead more about Kofax Power PDF code execution | CVE-2023-51563
CVE-prog
  • Vulnerabilities

Kofax Power PDF buffer overflow | CVE-2023-51566

January 5, 2024

NAME__________Kofax Power PDF buffer overflowPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF is vulnerable to a stack-based buffer overflow,...

Read MoreRead more about Kofax Power PDF buffer overflow | CVE-2023-51566
CVE-prog
  • Vulnerabilities

Kofax Power PDF information disclosure | CVE-2023-51567

January 5, 2024

NAME__________Kofax Power PDF information disclosurePlatforms Affected:Kofax Power PDFRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Kofax Power PDF could allow a remote attacker to obtain...

Read MoreRead more about Kofax Power PDF information disclosure | CVE-2023-51567

Posts pagination

Previous 1 … 1,843 1,844 1,845 1,846 1,847 1,848 1,849 … 4,522 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: KohaFoods Hawaii

November 12, 2025
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: bridge-housing-corp

November 12, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Treetop Companies

November 12, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: AsahiKASEI MICRODEVICES

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59511 – Microsoft – Windows 10 Version 1809

November 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel