Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Tenda N300 Wireless N VDSL2 Modem Router information disclosure | US-CERT VU#304455

September 9, 2023

NAME__________Tenda N300 Wireless N VDSL2 Modem Router information disclosurePlatforms Affected:Tenda N300 Wireless N VDSL2 Modem RouterRisk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Tenda N300...

Read MoreRead more about Tenda N300 Wireless N VDSL2 Modem Router information disclosure | US-CERT VU#304455
CVE-prog
  • Vulnerabilities

HPE Aruba Networking buffer overflow | CVE-2023-38484

September 9, 2023

NAME__________HPE Aruba Networking buffer overflowPlatforms Affected:Aruba Networks ArubaOS 10.4.0.1 Aruba Networks ArubaOS 8.11.1.0 Aruba Networks ArubaOS 8.10.0.6 Aruba Networks ArubaOS...

Read MoreRead more about HPE Aruba Networking buffer overflow | CVE-2023-38484
CVE-prog
  • Vulnerabilities

HPE Aruba Networking products security bypass | CVE-2023-38486

September 9, 2023

NAME__________HPE Aruba Networking products security bypassPlatforms Affected:Aruba Networks ArubaOS 10.4.0.1 Aruba Networks ArubaOS 8.11.1.0 Aruba Networks ArubaOS 8.10.0.6 Aruba Networks...

Read MoreRead more about HPE Aruba Networking products security bypass | CVE-2023-38486
CVE-prog
  • Vulnerabilities

SOCOMEC MODULYS GP cross-site scripting | CVE-2023-38582

September 9, 2023

NAME__________SOCOMEC MODULYS GP cross-site scriptingPlatforms Affected:Socomec MOD3GP-SY-120K 01.12.10Risk Level:6.3Exploitability:HighConsequences:Obtain Information DESCRIPTION__________SOCOMEC MODULYS GP is vulnerable to cross-site scripting, caused by...

Read MoreRead more about SOCOMEC MODULYS GP cross-site scripting | CVE-2023-38582
CVE-prog
  • Vulnerabilities

IBM QRadar WinCollect Agent privilege escalation | CVE-2023-38736

September 9, 2023

NAME__________IBM QRadar WinCollect Agent privilege escalationPlatforms Affected:IBM QRadar WinCollect Agent 10.0 IBM QRadar WinCollect Agent 10.1.6Risk Level:7.5Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________IBM QRadar...

Read MoreRead more about IBM QRadar WinCollect Agent privilege escalation | CVE-2023-38736
CVE-prog
  • Vulnerabilities

SOCOMEC MODULYS GP cross-site scripting | CVE-2023-38255

September 9, 2023

NAME__________SOCOMEC MODULYS GP cross-site scriptingPlatforms Affected:Socomec MOD3GP-SY-120K 01.12.10Risk Level:6.5Exploitability:HighConsequences:Obtain Information DESCRIPTION__________SOCOMEC MODULYS GP is vulnerable to cross-site scripting, caused by...

Read MoreRead more about SOCOMEC MODULYS GP cross-site scripting | CVE-2023-38255
CVE-prog
  • Vulnerabilities

Delta Electronics CNCSoft-B DOPSoft buffer overflow | CVE-2023-4685

September 9, 2023

NAME__________Delta Electronics CNCSoft-B DOPSoft buffer overflowPlatforms Affected:Delta Electronics CNCSoft-B DOPSoft 1.0.0.4Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Delta Electronics CNCSoft-B DOPSoft is vulnerable to...

Read MoreRead more about Delta Electronics CNCSoft-B DOPSoft buffer overflow | CVE-2023-4685
CVE-prog
  • Vulnerabilities

Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers buffer overflow | CVE-2023-20250

September 9, 2023

NAME__________Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers buffer overflowPlatforms Affected:Cisco RV110W Wireless-N VPN Firewall Cisco RV130W Wireless-N Multifunction...

Read MoreRead more about Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers buffer overflow | CVE-2023-20250
CVE-prog
  • Vulnerabilities

Smart S45F Multi-Service Secure Gateway Intelligent Management Platform SQL injection | CVE-2023-4745

September 9, 2023

NAME__________Smart S45F Multi-Service Secure Gateway Intelligent Management Platform SQL injectionPlatforms Affected:Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management PlatformRisk...

Read MoreRead more about Smart S45F Multi-Service Secure Gateway Intelligent Management Platform SQL injection | CVE-2023-4745
CVE-prog
  • Vulnerabilities

D-Link DIR-3040 buffer overflow | CVE-2023-41230

September 9, 2023

NAME__________D-Link DIR-3040 buffer overflowPlatforms Affected:D-Link DIR-3040 1.20B03Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-3040 is vulnerable to a stack-based buffer overflow, caused by...

Read MoreRead more about D-Link DIR-3040 buffer overflow | CVE-2023-41230
CVE-prog
  • Vulnerabilities

IBM Maximo Application Suite and IBM Maximo Asset Management HTML injection | CVE-2023-32332

September 9, 2023

NAME__________IBM Maximo Application Suite and IBM Maximo Asset Management HTML injectionPlatforms Affected:IBM Maximo Asset Management 7.6.1.2 IBM Maximo Asset Management...

Read MoreRead more about IBM Maximo Application Suite and IBM Maximo Asset Management HTML injection | CVE-2023-32332
CVE-prog
  • Vulnerabilities

SOCOMEC MODULYS GP information disclosure | CVE-2023-39452

September 9, 2023

NAME__________SOCOMEC MODULYS GP information disclosurePlatforms Affected:Socomec MOD3GP-SY-120K 01.12.10Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________SOCOMEC MODULYS GP could allow a remote attacker to obtain...

Read MoreRead more about SOCOMEC MODULYS GP information disclosure | CVE-2023-39452
CVE-prog
  • Vulnerabilities

highlight.php module for Drupal cross-site scripting |

September 9, 2023

NAME__________highlight.php module for Drupal cross-site scriptingPlatforms Affected:Drupal highlight.php module for Drupal 1.0.0Risk Level:5.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________highlight.php module for Drupal is vulnerable...

Read MoreRead more about highlight.php module for Drupal cross-site scripting |
CVE-prog
  • Vulnerabilities

D-Link DIR-3040 buffer overflow | CVE-2023-41227

September 9, 2023

NAME__________D-Link DIR-3040 buffer overflowPlatforms Affected:D-Link DIR-3040 1.20B03Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-3040 is vulnerable to a stack-based buffer overflow, caused by...

Read MoreRead more about D-Link DIR-3040 buffer overflow | CVE-2023-41227
CVE-prog
  • Vulnerabilities

Dell Digital Delivery denial of service | CVE-2023-32470

September 9, 2023

NAME__________Dell Digital Delivery denial of servicePlatforms Affected:Dell Digital Delivery 5.0.81.0Risk Level:5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Dell Digital Delivery is vulnerable to a...

Read MoreRead more about Dell Digital Delivery denial of service | CVE-2023-32470
CVE-prog
  • Vulnerabilities

D-Link DIR-3040 buffer overflow | CVE-2023-41228

September 9, 2023

NAME__________D-Link DIR-3040 buffer overflowPlatforms Affected:D-Link DIR-3040 1.20B03Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-3040 is vulnerable to a stack-based buffer overflow, caused by...

Read MoreRead more about D-Link DIR-3040 buffer overflow | CVE-2023-41228
CVE-prog
  • Vulnerabilities

D-Link DIR-3040 buffer overflow | CVE-2023-41226

September 9, 2023

NAME__________D-Link DIR-3040 buffer overflowPlatforms Affected:D-Link DIR-3040 1.20B03Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-3040 is vulnerable to a stack-based buffer overflow, caused by...

Read MoreRead more about D-Link DIR-3040 buffer overflow | CVE-2023-41226
CVE-prog
  • Vulnerabilities

D-Link DIR-3040 buffer overflow | CVE-2023-41217

September 9, 2023

NAME__________D-Link DIR-3040 buffer overflowPlatforms Affected:D-Link DIR-3040Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-3040 routers are vulnerable to a stack-based buffer overflow, caused by...

Read MoreRead more about D-Link DIR-3040 buffer overflow | CVE-2023-41217
CVE-prog
  • Vulnerabilities

D-Link DIR-3040 buffer overflow | CVE-2023-41216

September 9, 2023

NAME__________D-Link DIR-3040 buffer overflowPlatforms Affected:D-Link DIR-3040Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-3040 routers are vulnerable to a stack-based buffer overflow, caused by...

Read MoreRead more about D-Link DIR-3040 buffer overflow | CVE-2023-41216
CVE-prog
  • Vulnerabilities

SOCOMEC MODULYS GP information disclosure | CVE-2023-41965

September 9, 2023

NAME__________SOCOMEC MODULYS GP information disclosurePlatforms Affected:Socomec MOD3GP-SY-120K 01.12.10Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________SOCOMEC MODULYS GP could allow a remote attacker to obtain...

Read MoreRead more about SOCOMEC MODULYS GP information disclosure | CVE-2023-41965
CVE-prog
  • Vulnerabilities

Slims 9 Bulian server-side request forgery | CVE-2023-40969

September 9, 2023

NAME__________Slims 9 Bulian server-side request forgeryPlatforms Affected:Slims9 Bulian 9.6.1Risk Level:6.1Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION__________Slims 9 Bulian is vulnerable to server-side request forgery,...

Read MoreRead more about Slims 9 Bulian server-side request forgery | CVE-2023-40969
CVE-prog
  • Vulnerabilities

D-Link DIR-3040 buffer overflow | CVE-2023-41219

September 9, 2023

NAME__________D-Link DIR-3040 buffer overflowPlatforms Affected:D-Link DIR-3040Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-3040 routers are vulnerable to a stack-based buffer overflow, caused by...

Read MoreRead more about D-Link DIR-3040 buffer overflow | CVE-2023-41219
CVE-prog
  • Vulnerabilities

D-Link DIR-3040 buffer overflow | CVE-2023-41220

September 9, 2023

NAME__________D-Link DIR-3040 buffer overflowPlatforms Affected:D-Link DIR-3040Risk Level:6.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________D-Link DIR-3040 routers are vulnerable to a stack-based buffer overflow, caused by...

Read MoreRead more about D-Link DIR-3040 buffer overflow | CVE-2023-41220
image-1
  • Data Breach
  • Ransomware

8 Base Ransomware Victim: UNIVERSAL REALTY GROUP

September 9, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about 8 Base Ransomware Victim: UNIVERSAL REALTY GROUP

Posts pagination

Previous 1 … 2,170 2,171 2,172 2,173 2,174 2,175 2,176 … 4,515 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: Servicios del Valle del Fuerte, Mexico

November 9, 2025
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: Fidelity Pension Managers, Nigeria

November 9, 2025
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: Instituto Nacional de Oftalmologia, Peru

November 9, 2025
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: Eastern Cape Department of Human Settlements, South Africa

November 9, 2025
image
  • Data Breach
  • Ransomware

[BEAST] – Ransomware Victim: Punjab Forensic Science Agency

November 9, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel