Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025
unlock_membership
  • Premium Members Content

Mastering IoT Security Strategies for a Safer Connected World

August 6, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Forensic Analysis in Cybersecurity

August 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Vulnerabilities

CVE Alert: CVE-2025-50849

August 1, 2025

Vulnerability Summary: CVE-2025-50849 CS Cart 4.18.3 is vulnerable to Insecure Direct Object Reference (IDOR). The user profile functionality allows enabling...

Read MoreRead more about CVE Alert: CVE-2025-50849
image
  • Vulnerabilities

CVE Alert: CVE-2025-50475

August 1, 2025

Vulnerability Summary: CVE-2025-50475 An OS command injection vulnerability exists in Russound MBX-PRE-D67F firmware version 3.1.6, allowing unauthenticated attackers to execute...

Read MoreRead more about CVE Alert: CVE-2025-50475
image
  • Vulnerabilities

CVE Alert: CVE-2025-52289

August 1, 2025

Vulnerability Summary: CVE-2025-52289 A Broken Access Control vulnerability in MagnusBilling v7.8.5.3 allows newly registered users to gain escalated privileges by...

Read MoreRead more about CVE Alert: CVE-2025-52289
image
  • Vulnerabilities

CVE Alert: CVE-2025-50848

August 1, 2025

Vulnerability Summary: CVE-2025-50848 A file upload vulnerability was discovered in CS Cart 4.18.3, allows attackers to execute arbitrary code. CS...

Read MoreRead more about CVE Alert: CVE-2025-50848
image
  • Vulnerabilities

CVE Alert: CVE-2025-29556

August 1, 2025

Vulnerability Summary: CVE-2025-29556 ExaGrid EX10 6.3 - 7.0.1.P08 is vulnerable to Incorrect Access Control. Since version 6.3, ExaGrid enforces restrictions...

Read MoreRead more about CVE Alert: CVE-2025-29556
image
  • Vulnerabilities

CVE Alert: CVE-2025-51569

August 1, 2025

Vulnerability Summary: CVE-2025-51569 A cross-site scripting (XSS) vulnerability exists in the LB-Link BL-CPE300M 01.01.02P42U14_06 router's web interface. The /goform/goform_get_cmd_process endpoint...

Read MoreRead more about CVE Alert: CVE-2025-51569
image
  • Vulnerabilities

CVE Alert: CVE-2025-8408

August 1, 2025

Vulnerability Summary: CVE-2025-8408 A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. Affected is an...

Read MoreRead more about CVE Alert: CVE-2025-8408
image
  • Vulnerabilities

CVE Alert: CVE-2025-50847

August 1, 2025

Vulnerability Summary: CVE-2025-50847 Cross Site Request Forgery (CSRF) vulnerability in CS Cart 4.18.3, allows attackers to add products to a...

Read MoreRead more about CVE Alert: CVE-2025-50847
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: cadex[.]com

August 1, 2025

Ransomware Group: QILIN VICTIM NAME: cadexcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: cadex[.]com
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: envac[.]es

August 1, 2025

Ransomware Group: QILIN VICTIM NAME: envaces NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: envac[.]es
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: fortsmithschools[.]org

August 1, 2025

Ransomware Group: QILIN VICTIM NAME: fortsmithschoolsorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: fortsmithschools[.]org
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: Radford City Schools

August 1, 2025

Ransomware Group: INCRANSOM VICTIM NAME: Radford City Schools NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [INCRANSOM] – Ransomware Victim: Radford City Schools
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Meissner Fenstertechnik

August 1, 2025

Ransomware Group: AKIRA VICTIM NAME: Meissner Fenstertechnik NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [AKIRA] – Ransomware Victim: Meissner Fenstertechnik
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Great Lakes Carpet &Tile

August 1, 2025

Ransomware Group: AKIRA VICTIM NAME: Great Lakes Carpet &Tile NOTE: No files or stolen information are by RedPacket Security. Any...

Read MoreRead more about [AKIRA] – Ransomware Victim: Great Lakes Carpet &Tile
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Hölscher Holding

August 1, 2025

Ransomware Group: AKIRA VICTIM NAME: Hölscher Holding NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [AKIRA] – Ransomware Victim: Hölscher Holding
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Herrman Law Firm

August 1, 2025

Ransomware Group: AKIRA VICTIM NAME: Herrman Law Firm NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [AKIRA] – Ransomware Victim: Herrman Law Firm
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Guyana Sugar

August 1, 2025

Ransomware Group: AKIRA VICTIM NAME: Guyana Sugar NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [AKIRA] – Ransomware Victim: Guyana Sugar
image
  • Vulnerabilities

CVE Alert: CVE-2025-52203

August 1, 2025

Vulnerability Summary: CVE-2025-52203 A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket...

Read MoreRead more about CVE Alert: CVE-2025-52203
image
  • Vulnerabilities

CVE Alert: CVE-2025-8409

August 1, 2025

Vulnerability Summary: CVE-2025-8409 A vulnerability has been found in code-projects Vehicle Management 1.0 and classified as critical. Affected by this...

Read MoreRead more about CVE Alert: CVE-2025-8409
image
  • Vulnerabilities

CVE Alert: CVE-2025-46809

August 1, 2025

Vulnerability Summary: CVE-2025-46809 A Insertion of Sensitive Information into Log File vulnerability in SUSE Multi Linux Manager exposes the HTTP...

Read MoreRead more about CVE Alert: CVE-2025-46809
image
  • Vulnerabilities

CVE Alert: CVE-2025-50850

August 1, 2025

Vulnerability Summary: CVE-2025-50850 An issue was discovered in CS Cart 4.18.3 allows the vendor login functionality lacks essential security controls...

Read MoreRead more about CVE Alert: CVE-2025-50850
image
  • Vulnerabilities

CVE Alert: CVE-2025-50867

August 1, 2025

Vulnerability Summary: CVE-2025-50867 A SQL Injection vulnerability exists in the takeassessment2.php endpoint of the CloudClassroom-PHP-Project 1.0, where the Q5 POST...

Read MoreRead more about CVE Alert: CVE-2025-50867
image
  • Vulnerabilities

CVE Alert: CVE-2025-51384

August 1, 2025

Vulnerability Summary: CVE-2025-51384 D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter. Affected...

Read MoreRead more about CVE Alert: CVE-2025-51384
image
  • Vulnerabilities

CVE Alert: CVE-2024-34327

August 1, 2025

Vulnerability Summary: CVE-2024-34327 Sielox AnyWare v2.1.2 was discovered to contain a SQL injection vulnerability via the email address field of...

Read MoreRead more about CVE Alert: CVE-2024-34327

Posts pagination

Previous 1 … 20 21 22 23 24 25 26 … 4,324 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-54395

August 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54394

August 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54396

August 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-24000

August 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54393

August 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel