Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Adobe Substance 3D Stager code execution |

August 15, 2023

NAME__________Adobe Substance 3D Stager code executionPlatforms Affected:Adobe Substance 3D Stager 2.0.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Adobe Substance 3D Stager could allow a...

Read MoreRead more about Adobe Substance 3D Stager code execution |
image-2
  • Data Breach
  • Ransomware

NOESCAPE Ransomware Victim: John L Lowery & Associates

August 15, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about NOESCAPE Ransomware Victim: John L Lowery & Associates
image-2
  • Data Breach
  • Ransomware

NOESCAPE Ransomware Victim: Fondation De Verdeil

August 15, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about NOESCAPE Ransomware Victim: Fondation De Verdeil
image-2
  • Data Breach
  • Ransomware

NOESCAPE Ransomware Victim: Federal Bar Association

August 15, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about NOESCAPE Ransomware Victim: Federal Bar Association
ab
  • News

Catching the Catphish: Join the Expert Webinar on Combating Credential Phishing

August 15, 2023

Is your organization constantly under threat from credential phishing? Even with comprehensive security awareness training, many employees still fall victim...

Read MoreRead more about Catching the Catphish: Join the Expert Webinar on Combating Credential Phishing
npm
  • News

North Korean Hackers Suspected in New Wave of Malicious npm Packages

August 15, 2023

The npm package registry has emerged as the target of yet another highly targeted attack campaign that aims to entice...

Read MoreRead more about North Korean Hackers Suspected in New Wave of Malicious npm Packages
hacke
  • News

Over 12,000 Computers Compromised by Info Stealers Linked to Users of Cybercrime Forums

August 15, 2023

A "staggering" 120,000 computers infected by stealer malware have credentials associated with cybercrime forums, many of them belonging to malicious...

Read MoreRead more about Over 12,000 Computers Compromised by Info Stealers Linked to Users of Cybercrime Forums
image-1
  • Data Breach
  • Ransomware

8 Base Ransomware Victim: Stockdale Podiatry

August 15, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about 8 Base Ransomware Victim: Stockdale Podiatry
image-1
  • Data Breach
  • Ransomware

8 Base Ransomware Victim: Keystone Insurance Services

August 15, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about 8 Base Ransomware Victim: Keystone Insurance Services
image-1
  • Data Breach
  • Ransomware

8 Base Ransomware Victim: ANS

August 15, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about 8 Base Ransomware Victim: ANS
image-1
  • Data Breach
  • Ransomware

8 Base Ransomware Victim: Aspect Structural Engineers

August 15, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about 8 Base Ransomware Victim: Aspect Structural Engineers
Colorado-state-building
  • News

Colorado warns 4 million of data stolen in IBM MOVEit breach

August 15, 2023

Image: Midjourney The Colorado Department of Health Care Policy & Financing (HCPF) is alerting more than four million individuals of a...

Read MoreRead more about Colorado warns 4 million of data stolen in IBM MOVEit breach
criminalip-polyswam-header
  • News

Criminal IP Teams Up with PolySwarm to Strengthen Threat Detection

August 15, 2023

In today's ever-evolving digital landscape, the significance of effective malware detection remains paramount. With the escalating threat of cyberattacks, cybersecurity...

Read MoreRead more about Criminal IP Teams Up with PolySwarm to Strengthen Threat Detection
Linux
  • News

Monti ransomware targets VMware ESXi servers with new Linux locker

August 15, 2023

The Monti ransomware gang has returned, after a two-month break from publishing victims on their data leak site, using a new...

Read MoreRead more about Monti ransomware targets VMware ESXi servers with new Linux locker
hacker-2
  • News

Over 100K hacking forums accounts exposed by info-stealing malware

August 15, 2023

Researchers discovered 120,000 infected systems that contained credentials for cybercrime forums. Many of the computers belong to hackers, the researchers...

Read MoreRead more about Over 100K hacking forums accounts exposed by info-stealing malware
FBI_headpic-1
  • News

FBI warns of increasing cryptocurrency recovery scams

August 15, 2023

The FBI is warning of an increase in scammers pretending to be recovery companies that can help victims of cryptocurrency...

Read MoreRead more about FBI warns of increasing cryptocurrency recovery scams
data-leak-header-1
  • News

Discord.io confirms breach after hacker steals data of 760K users

August 15, 2023

Updated: Added further information from Akihirah about the sale of the database. The Discord.io custom invite service has temporarily shut down...

Read MoreRead more about Discord.io confirms breach after hacker steals data of 760K users
android-smartphone
  • News

Threat actors use beta apps to bypass mobile app store security

August 15, 2023

The FBI is warning of a new tactic used by cybercriminals where they promote malicious "beta" versions of cryptocurrency investment...

Read MoreRead more about Threat actors use beta apps to bypass mobile app store security
news
  • News
  • Premium Members Content

Authorities Take Down Lolek Bulletproof Hosting Provider

August 15, 2023

Police have taken down a Lolek bulletproof hosting service used by criminals to launch cyber-attacks across the world.The takedown was...

Read MoreRead more about Authorities Take Down Lolek Bulletproof Hosting Provider
news
  • News
  • Premium Members Content

Several Flaws Found in CyberPower and Dataprobe Products

August 15, 2023

A series of security vulnerabilities have been discovered in CyberPower’s PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and Dataprobe’s...

Read MoreRead more about Several Flaws Found in CyberPower and Dataprobe Products
news
  • News
  • Premium Members Content

Alberta Dental Services Security Breach Exposes 1.47M Records

August 15, 2023

Alberta Dental Service Corporation (ADSC) has revealed that nearly 1.47 million individuals have been affected by a data breach that...

Read MoreRead more about Alberta Dental Services Security Breach Exposes 1.47M Records
news
  • News
  • Premium Members Content

Security Researchers Publish Gigabud Banking Malware Analysis

August 15, 2023

Cybersecurity researchers have published a new analysis of the elusive Gigabud banking malware. Originating as an Android Remote Access Trojan (RAT),...

Read MoreRead more about Security Researchers Publish Gigabud Banking Malware Analysis
news
  • News
  • Premium Members Content

Microsoft: Critical CODESYS Flaws Could Shut Down Power Plants

August 15, 2023

Microsoft researchers have identified multiple high-severity vulnerabilities that could enable threat actors to shut down power plants.The flaws were discovered...

Read MoreRead more about Microsoft: Critical CODESYS Flaws Could Shut Down Power Plants
CISA_Logo
  • CISA

CISA: CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022

August 15, 2023

CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022 The U.S. Cybersecurity and...

Read MoreRead more about CISA: CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022

Posts pagination

Previous 1 … 1,976 1,977 1,978 1,979 1,980 1,981 1,982 … 4,250 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2024-42912

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-32874

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-32353

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-37104

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53925

July 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel