Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
oauth
  • News

Critical OAuth Flaws Uncovered in Grammarly, Vidio, and Bukalapak Platforms

October 25, 2023

Critical security flaws have been disclosed in the Open Authorization (OAuth) implementation of popular online services such as Grammarly, Vidio,...

Read MoreRead more about Critical OAuth Flaws Uncovered in Grammarly, Vidio, and Bukalapak Platforms
email-hacking
  • News

Nation State Hackers Exploiting Zero-Day in Roundcube Webmail Software

October 25, 2023

The threat actor known as Winter Vivern has been observed exploiting a zero-day flaw in Roundcube webmail software on October...

Read MoreRead more about Nation State Hackers Exploiting Zero-Day in Roundcube Webmail Software
payment
  • News

Malvertising Campaign Targets Brazil’s PIX Payment System with GoPIX Malware

October 25, 2023

The popularity of Brazil's PIX instant payment system has made it a lucrative target for threat actors looking to generate...

Read MoreRead more about Malvertising Campaign Targets Brazil’s PIX Payment System with GoPIX Malware
ransomware-1
  • News

The Rise of S3 Ransomware: How to Identify and Combat It

October 25, 2023

In today's digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3 standing as the...

Read MoreRead more about The Rise of S3 Ransomware: How to Identify and Combat It
d36390d1fd8e3b01a0b22db852b2bc675af297db3a842336ab3e544458c34fbb
  • News

Hong Kong residents targeted in malvertising campaigns for WhatsApp, Telegram

October 25, 2023

Malvertising is a powerful malware or scam delivery mechanism that makes it easy to target specific geographies or even users....

Read MoreRead more about Hong Kong residents targeted in malvertising campaigns for WhatsApp, Telegram
hacking-4
  • News

Act Now: VMware Releases Patch for Critical vCenter Server RCE Vulnerability

October 25, 2023

VMware has released security updates to address a critical flaw in the vCenter Server that could result in remote code...

Read MoreRead more about Act Now: VMware Releases Patch for Critical vCenter Server RCE Vulnerability
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: mgbwlaw[.]com

October 25, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: mgbwlaw[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: linkmicrotek[.]com

October 25, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: linkmicrotek[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: ambic[.]co[.]uk

October 25, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: ambic[.]co[.]uk
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: excon[.]cl

October 25, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: excon[.]cl
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: fern-plastics[.]co[.]uk

October 25, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: fern-plastics[.]co[.]uk
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: camico[.]com

October 25, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: camico[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: martinsonservices[.]com

October 25, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: martinsonservices[.]com
CVE-prog
  • Vulnerabilities

Add Custom Body Class plugin for WordPress cross-site scripting | CVE-2023-5205

October 25, 2023

NAME__________Add Custom Body Class plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Add Custom Body Class plugin for WordPress 1.4.1 WordPress Add...

Read MoreRead more about Add Custom Body Class plugin for WordPress cross-site scripting | CVE-2023-5205
CVE-prog
  • Vulnerabilities

IBM TXSeries denial of service | CVE-2023-42031

October 25, 2023

NAME__________IBM TXSeries denial of servicePlatforms Affected:IBM TXSeries for Multiplatforms 8.1 IBM TXSeries for Multiplatforms 8.2 IBM TXSeries for Multiplatforms 9.1...

Read MoreRead more about IBM TXSeries denial of service | CVE-2023-42031
CVE-prog
  • Vulnerabilities

Soisy Pagamento Rateale plugin for WordPress information disclosure | CVE-2023-5132

October 25, 2023

NAME__________Soisy Pagamento Rateale plugin for WordPress information disclosurePlatforms Affected:WordPress Soisy Pagamento Rateale plugin for WordPress 6.0.1 WordPress Soisy Pagamento Rateale...

Read MoreRead more about Soisy Pagamento Rateale plugin for WordPress information disclosure | CVE-2023-5132
CVE-prog
  • Vulnerabilities

Kodbox cross-site scripting | CVE-2023-45998

October 25, 2023

NAME__________Kodbox cross-site scriptingPlatforms Affected:kodbox kodbox 1.44Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Kodbox is vulnerable to cross-site scripting, caused by improper validation of user-supplied...

Read MoreRead more about Kodbox cross-site scripting | CVE-2023-45998
CVE-prog
  • Vulnerabilities

Serial Numbers for WooCommerce – License Manager Plugin for WordPress cross-site request forgery | CVE-2023-46078

October 25, 2023

NAME__________Serial Numbers for WooCommerce – License Manager Plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress Serial Numbers for WooCommerce – License...

Read MoreRead more about Serial Numbers for WooCommerce – License Manager Plugin for WordPress cross-site request forgery | CVE-2023-46078
CVE-prog
  • Vulnerabilities

SALESmanago plugin for WordPress security bypass | CVE-2023-4939

October 25, 2023

NAME__________SALESmanago plugin for WordPress security bypassPlatforms Affected:WordPress SALESmanago plugin for WordPress 3.2.4 WordPress SALESmanago plugin for WordPress 3.2.3Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security...

Read MoreRead more about SALESmanago plugin for WordPress security bypass | CVE-2023-4939
CVE-prog
  • Vulnerabilities

WBCE cross-site scripting | CVE-2023-46054

October 25, 2023

NAME__________WBCE cross-site scriptingPlatforms Affected:WBCE CMS WBCE CMS 1.6.1Risk Level:5.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________WBCE is vulnerable to cross-site scripting, caused by improper validation...

Read MoreRead more about WBCE cross-site scripting | CVE-2023-46054
CVE-prog
  • Vulnerabilities

Rocket Font Plugin for WordPress cross-site request forgery | CVE-2023-46067

October 25, 2023

NAME__________Rocket Font Plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress Rocket Font Plugin for WordPress 1.2.3Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Rocket Font Plugin...

Read MoreRead more about Rocket Font Plugin for WordPress cross-site request forgery | CVE-2023-46067
CVE-prog
  • Vulnerabilities

sbt directory traversal | CVE-2023-46122

October 25, 2023

NAME__________sbt directory traversalPlatforms Affected:sbt sbt 1.9.6Risk Level:5.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________sbt could allow a remote attacker to traverse directories on the system,...

Read MoreRead more about sbt directory traversal | CVE-2023-46122
CVE-prog
  • Vulnerabilities

Wp Ultimate Review Plugin for WordPress cross-site request forgery | CVE-2023-46085

October 25, 2023

NAME__________Wp Ultimate Review Plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress Wp Ultimate Review Plugin for WordPress 2.2.4Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Wp...

Read MoreRead more about Wp Ultimate Review Plugin for WordPress cross-site request forgery | CVE-2023-46085
CVE-prog
  • Vulnerabilities

SuperWebMailer code execution | CVE-2023-38193

October 25, 2023

NAME__________SuperWebMailer code executionPlatforms Affected:SuperWebMailer SuperWebMailer 9.00.0.01710Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________SuperWebMailer could allow a remote authenticated attacker to execute arbitrary code on...

Read MoreRead more about SuperWebMailer code execution | CVE-2023-38193

Posts pagination

Previous 1 … 1,943 1,944 1,945 1,946 1,947 1,948 1,949 … 4,413 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-10058 – smackcoders – WP Import – Ultimate CSV XML Importer for WordPress

September 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10057 – smackcoders – WP Import – Ultimate CSV XML Importer for WordPress

September 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10143 – catchthemes – Catch Dark Mode

September 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10589 – N-Partner – N-Reporter

September 17, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 38[.]173[.]19[.]175:8731

September 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel