Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
news
  • News
  • Premium Members Content

EU Cyber Resilience Act Could be Exploited for Surveillance, Experts Warn

October 4, 2023

The EU’s Cyber Resilience Act (CRA) could be misused by governments for intelligence or surveillance purposes, a group of industry...

Read MoreRead more about EU Cyber Resilience Act Could be Exploited for Surveillance, Experts Warn
HIBP-Banner-1
  • Data Breach

Activision – 16,006 breached accounts

October 4, 2023

HIBP In December 2022, attackers socially engineered an Activision HR employee into disclosing information which led to the breach of...

Read MoreRead more about Activision – 16,006 breached accounts
LUCR-3
  • News

LUCR-3: Scattered Spider Getting SaaS-y in the Cloud

October 4, 2023

LUCR-3 overlaps with groups such as Scattered Spider, Oktapus, UNC3944, and STORM-0875 and is a financially motivated attacker that leverages...

Read MoreRead more about LUCR-3: Scattered Spider Getting SaaS-y in the Cloud
user
  • News

Silent Skimmer: A Year-Long Web Skimming Campaign Targeting Online Payment Businesses

October 4, 2023

A financially motivated campaign has been targeting online payment businesses in the Asia Pacific, North America, and Latin America with...

Read MoreRead more about Silent Skimmer: A Year-Long Web Skimming Campaign Targeting Online Payment Businesses
arm
  • News

Arm Issues Patch for Mali GPU Kernel Driver Vulnerability Amidst Ongoing Exploitation

October 4, 2023

Arm has released security patches to contain a security flaw in the Mali GPU Kernel Driver that has come under...

Read MoreRead more about Arm Issues Patch for Mali GPU Kernel Driver Vulnerability Amidst Ongoing Exploitation
breachlock
  • News

APIs: Unveiling the Silent Killer of Cyber Security Risk Across Industries

October 4, 2023

Introduction# In today's interconnected digital ecosystem, Application Programming Interfaces (APIs) play a pivotal role in enabling seamless communication and data...

Read MoreRead more about APIs: Unveiling the Silent Killer of Cyber Security Risk Across Industries
cf
  • News

Researcher Reveals New Techniques to Bypass Cloudflare’s Firewall and DDoS Protection

October 4, 2023

Firewall and distributed denial-of-service (DDoS) attack prevention mechanisms in Cloudflare can be circumvented by exploiting gaps in cross-tenant security controls,...

Read MoreRead more about Researcher Reveals New Techniques to Bypass Cloudflare’s Firewall and DDoS Protection
api-security
  • News

API Security Trends 2023 – Have Organizations Improved their Security Posture?

October 4, 2023

APIs, also known as application programming interfaces, serve as the backbone of modern software applications, enabling seamless communication and data...

Read MoreRead more about API Security Trends 2023 – Have Organizations Improved their Security Posture?
shell
  • News

Warning: PyTorch Models Vulnerable to Remote Code Execution via ShellTorch

October 4, 2023

Cybersecurity researchers have disclosed multiple critical security flaws in the TorchServe tool for serving and scaling PyTorch models that could...

Read MoreRead more about Warning: PyTorch Models Vulnerable to Remote Code Execution via ShellTorch
wazuh
  • News

Protecting your IT infrastructure with Security Configuration Assessment (SCA)

October 4, 2023

Security Configuration Assessment (SCA) is critical to an organization's cybersecurity strategy. SCA aims to discover vulnerabilities and misconfigurations that malicious...

Read MoreRead more about Protecting your IT infrastructure with Security Configuration Assessment (SCA)
qqq
  • News

Qualcomm Releases Patch for 3 new Zero-Days Under Active Exploitation

October 4, 2023

Chipmaker Qualcomm has released security updates to address 17 vulnerabilities in various components, while warning that three other zero-days have...

Read MoreRead more about Qualcomm Releases Patch for 3 new Zero-Days Under Active Exploitation
npm
  • News

Over 3 Dozen Data-Stealing Malicious npm Packages Found Targeting Developers

October 4, 2023

Nearly three dozen counterfeit packages have been discovered in the npm package repository that are designed to exfiltrate sensitive data...

Read MoreRead more about Over 3 Dozen Data-Stealing Malicious npm Packages Found Targeting Developers
CISA_Logo
  • CISA

CISA: NSA, FBI, CISA, and Japanese Partners Release Advisory on PRC-Linked Cyber Actors

October 4, 2023

NSA, FBI, CISA, and Japanese Partners Release Advisory on PRC-Linked Cyber Actors Today, the U.S. National Security Agency (NSA), Federal...

Read MoreRead more about CISA: NSA, FBI, CISA, and Japanese Partners Release Advisory on PRC-Linked Cyber Actors
CISA_Logo
  • CISA

CISA: Cisco Releases Security Advisories for Multiple Products

October 4, 2023

Cisco Releases Security Advisories for Multiple Products Cisco has released security advisories for vulnerabilities affecting multiple Cisco products. A remote...

Read MoreRead more about CISA: Cisco Releases Security Advisories for Multiple Products
CISA_Logo
  • CISA

CISA: CISA Releases Six Industrial Control Systems Advisories

October 4, 2023

CISA Releases Six Industrial Control Systems Advisories CISA released six Industrial Control Systems (ICS) advisories on September 26, 2023. These...

Read MoreRead more about CISA: CISA Releases Six Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: CISA Adds One Known Exploited Vulnerability to Catalog

October 4, 2023

CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA_Logo
  • CISA

CISA: Mozilla Releases Security Advisories for Thunderbird and Firefox

October 4, 2023

Mozilla Releases Security Advisories for Thunderbird and Firefox Mozilla has released security updates to address vulnerabilities for Thunderbird 115.3, Firefox...

Read MoreRead more about CISA: Mozilla Releases Security Advisories for Thunderbird and Firefox
CISA_Logo
  • CISA

CISA: CISA Releases Three Industrial Control Systems Advisories

October 4, 2023

CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on September 28, 2023. These...

Read MoreRead more about CISA: CISA Releases Three Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: CISA Adds One Known Exploited Vulnerability to Catalog

October 4, 2023

CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA_Logo
  • CISA

CISA: Mozilla Releases Security Updates for Multiple Products

October 4, 2023

Mozilla Releases Security Updates for Multiple Products Mozilla has released security updates to address a vulnerability affecting Firefox, Firefox ESR,...

Read MoreRead more about CISA: Mozilla Releases Security Updates for Multiple Products
CISA_Logo
  • CISA

CISA: CISA Adds One Known Exploited Vulnerability to Catalog

October 4, 2023

CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA_Logo
  • CISA

CISA: Apple Releases Security Updates for Multiple Products

October 4, 2023

Apple Releases Security Updates for Multiple Products Apple has released security updates to address vulnerabilities in multiple products. A cyber...

Read MoreRead more about CISA: Apple Releases Security Updates for Multiple Products
CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of September 25, 2023

October 3, 2023

High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoaccusoft -- imagegearAn out-of-bounds write vulnerability exists in the tiff_planar_adobe functionality of...

Read MoreRead more about US-CERT Vulnerability Summary for the Week of September 25, 2023
a18098da6207a1876c6d047026cb64c9a7c5df0263f6d4f0f47e178260427136
  • Tools

Nodesub – Command-Line Tool For Finding Subdomains In Bug Bounty Programs

October 3, 2023

Nodesub is a command-line tool for finding subdomains in bug bounty programs. It supports various subdomain enumeration techniques and provides...

Read MoreRead more about Nodesub – Command-Line Tool For Finding Subdomains In Bug Bounty Programs

Posts pagination

Previous 1 … 2,105 2,106 2,107 2,108 2,109 2,110 2,111 … 4,519 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

cybercrime
  • News

Spacex And Musk Called On To Rescue China’s Shenzhou 20 Crew

November 11, 2025
cybercrime
  • News

De Duplicating The Desktops: Let’s Come Together, Right Now

November 11, 2025
cybercrime
  • News

Techie Ran Up $40,000 Bill Trying To Download A Driver

November 11, 2025
cybercrime
  • News

Europe To Decide If 6 Ghz Is Shared Between Wi Fi And Cellular Networks

November 11, 2025
cybercrime
  • News

Data Breach At Chinese Infosec Firm Reveals Cyber Weapons And Target List

November 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel