Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Securing Critical Infrastructure in the Digital Age

July 18, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Apache Airflow Spark Provider information disclosure | CVE-2023-40272

August 18, 2023

NAME__________Apache Airflow Spark Provider information disclosurePlatforms Affected:Apache Airflow Spark Provider 4.1.2Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Apache Airflow Spark Provider could allow a...

Read MoreRead more about Apache Airflow Spark Provider information disclosure | CVE-2023-40272
CVE-prog
  • Vulnerabilities

Tracker Software PDF-XChange Editor information disclosure | CVE-2023-40473

August 18, 2023

NAME__________Tracker Software PDF-XChange Editor information disclosurePlatforms Affected:Tracker Software PDF-XChange Editor 9.5.367.0Risk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Tracker Software PDF-XChange Editor could allow a...

Read MoreRead more about Tracker Software PDF-XChange Editor information disclosure | CVE-2023-40473
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS on EX Series and SRX Series security bypass | CVE-2023-36845

August 18, 2023

NAME__________Juniper Networks Junos OS on EX Series and SRX Series security bypassPlatforms Affected:Juniper Networks SRX Series Juniper Networks EX Series...

Read MoreRead more about Juniper Networks Junos OS on EX Series and SRX Series security bypass | CVE-2023-36845
CVE-prog
  • Vulnerabilities

Tracker Software PDF-XChange Editor information disclosure | CVE-2023-40470

August 18, 2023

NAME__________Tracker Software PDF-XChange Editor information disclosurePlatforms Affected:Tracker Software PDF-XChange Editor 9.5.367.0Risk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Tracker Software PDF-XChange Editor could allow a...

Read MoreRead more about Tracker Software PDF-XChange Editor information disclosure | CVE-2023-40470
CVE-prog
  • Vulnerabilities

Tracker Software PDF-XChange Editor code execution | CVE-2023-40472

August 18, 2023

NAME__________Tracker Software PDF-XChange Editor code executionPlatforms Affected:Tracker Software PDF-XChange Editor 9.5.367.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Tracker Software PDF-XChange Editor could allow a...

Read MoreRead more about Tracker Software PDF-XChange Editor code execution | CVE-2023-40472
CVE-prog
  • Vulnerabilities

RARLAB WinRAR code execution | CVE-2023-40477

August 18, 2023

NAME__________RARLAB WinRAR code executionPlatforms Affected:RARLAB WinRAR 6.22Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________RARLAB WinRAR could allow a remote attacker to execute arbitrary code...

Read MoreRead more about RARLAB WinRAR code execution | CVE-2023-40477
CVE-prog
  • Vulnerabilities

PDF-XChange Editor buffer overflow | CVE-2023-39494

August 18, 2023

NAME__________PDF-XChange Editor buffer overflowPlatforms Affected:PDF-XChange Editor 9.4.363.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________PDF-XChange Editor is vulnerable to a heap-based buffer overflow, caused by...

Read MoreRead more about PDF-XChange Editor buffer overflow | CVE-2023-39494
CVE-prog
  • Vulnerabilities

PDF-XChange Editor code execution | CVE-2023-39498

August 18, 2023

NAME__________PDF-XChange Editor code executionPlatforms Affected:PDF-XChange Editor 9.4.363.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________PDF-XChange Editor could allow a remote attacker to execute arbitrary code...

Read MoreRead more about PDF-XChange Editor code execution | CVE-2023-39498
CVE-prog
  • Vulnerabilities

Tracker Software PDF-XChange Editor code execution | CVE-2023-40471

August 18, 2023

NAME__________Tracker Software PDF-XChange Editor code executionPlatforms Affected:Tracker Software PDF-XChange Editor 9.5.367.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Tracker Software PDF-XChange Editor could allow a...

Read MoreRead more about Tracker Software PDF-XChange Editor code execution | CVE-2023-40471
Android-malware
  • News

Thousands of Android APKs use compression trick to thwart analysis

August 18, 2023

Threat actors increasingly distribute malicious Android APKs (packaged app installers) that resist decompilation using unsupported, unknown, or heavily tweaked compression...

Read MoreRead more about Thousands of Android APKs use compression trick to thwart analysis
flare-ransomware-chains
  • News

Triple Extortion Ransomware and the Cybercrime Supply Chain

August 18, 2023

Ransomware attacks continue to grow both in sophistication and quantity. 2023 has already seen more ransomware attacks involving data exfiltration...

Read MoreRead more about Triple Extortion Ransomware and the Cybercrime Supply Chain
Zimbra
  • News

Phishing campaign steals accounts for Zimbra email servers worlwide

August 18, 2023

An ongoing phishing campaign has been underway since at least April 2023 that attempts to steal credentials for Zimbra Collaboration...

Read MoreRead more about Phishing campaign steals accounts for Zimbra email servers worlwide
hacker_sebastiaan-stam-unsplash
  • News

Hackers ask $120,000 for access to multi-billion auction house

August 18, 2023

Hackers claim to have breached the network of a major auction house and offered access to whoever was willing to...

Read MoreRead more about Hackers ask $120,000 for access to multi-billion auction house
PowerShell_headpic
  • News

Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks

August 18, 2023

Lax policies for package naming on Microsoft’s PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular...

Read MoreRead more about Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks
news
  • News
  • Premium Members Content

AnonFiles Shuts Down After Massive User Abuse

August 18, 2023

A popular anonymous file sharing service used by security researchers and threat actors has decided to close down, citing “extreme...

Read MoreRead more about AnonFiles Shuts Down After Massive User Abuse
news
  • News
  • Premium Members Content

Google Fixes 26 Bugs Amid Fake Update Warning

August 18, 2023

Google has released the latest version of its Chrome browser, addressing 26 vulnerabilities including eight critical flaws.Chrome 116 covers updates...

Read MoreRead more about Google Fixes 26 Bugs Amid Fake Update Warning
news
  • News
  • Premium Members Content

CISA Urges Patching of Actively Exploited Citrix Bug

August 18, 2023

The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that a Citrix flaw patched in June is being actively...

Read MoreRead more about CISA Urges Patching of Actively Exploited Citrix Bug
news
  • News
  • Premium Members Content

CISA Launches Joint Initiative to Secure RMM Software

August 18, 2023

The US Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its Remote Monitoring and Management (RMM) Cyber Defense Plan. Created in...

Read MoreRead more about CISA Launches Joint Initiative to Secure RMM Software
news
  • News
  • Premium Members Content

Phishing Spree Targets Zimbra Collaboration Account Holders

August 18, 2023

Cybersecurity researchers at ESET have exposed an ongoing mass-spreading phishing campaign that explicitly targets Zimbra Collaboration email server users. The...

Read MoreRead more about Phishing Spree Targets Zimbra Collaboration Account Holders
news
  • News
  • Premium Members Content

Critical Flaws in PowerShell Gallery Enable Malicious Exploits

August 18, 2023

Aqua Nautilus has uncovered critical vulnerabilities persisting within the PowerShell Gallery, resulting in a fertile ground for malicious actors to...

Read MoreRead more about Critical Flaws in PowerShell Gallery Enable Malicious Exploits
HIBP-Banner-1
  • Data Breach

iMenu360 – 3,425,860 breached accounts

August 18, 2023

HIBP In approximately late 2022, 3.4M customer records from iMenu360 ("The world's #1 most trusted online ordering platform") were exposed....

Read MoreRead more about iMenu360 – 3,425,860 breached accounts
hacking-11
  • News

NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security

August 18, 2023

A previously undetected attack method called NoFilter has been found to abuse the Windows Filtering Platform (WFP) to achieve privilege...

Read MoreRead more about NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security
CISA_Logo
  • CISA

CISA: CISA Releases Twelve Industrial Control Systems Advisories

August 18, 2023

CISA Releases Twelve Industrial Control Systems Advisories CISA released twelve Industrial Control Systems (ICS) advisories on August 10, 2023. These...

Read MoreRead more about CISA: CISA Releases Twelve Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: CISA Releases Two Industrial Control Systems Advisories

August 18, 2023

CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on August 15, 2023. These...

Read MoreRead more about CISA: CISA Releases Two Industrial Control Systems Advisories

Posts pagination

Previous 1 … 1,968 1,969 1,970 1,971 1,972 1,973 1,974 … 4,254 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hkcert
  • HKCERT
  • News

Ubuntu Linux Kernel Multiple Vulnerabilities

July 18, 2025
hkcert
  • HKCERT
  • News

F5 Products Denial of Service Vulnerability

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7757

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7756

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-23269

July 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel