Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Node.js weak security | CVE-2023-30590

June 22, 2023

NAME__________Node.js weak securityPlatforms Affected:Node.js Node.js 16.0 Node.js Node.js 18.0 Node.js Node.js 20.0Risk Level:5.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Node.js could provide weaker than expected...

Read MoreRead more about Node.js weak security | CVE-2023-30590
CVE-prog
  • Vulnerabilities

NetBSD spoofing | CVE-2023-3326

June 22, 2023

NAME__________NetBSD spoofingPlatforms Affected:NetBSD NetBSDRisk Level:3.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________NetBSD could allow a remote attacker to conduct spoofing attacks, caused by improper distinction...

Read MoreRead more about NetBSD spoofing | CVE-2023-3326
CVE-prog
  • Vulnerabilities

Devolutions Server information disclosure | CVE-2023-2400

June 22, 2023

NAME__________Devolutions Server information disclosurePlatforms Affected:Devolutions Devolutions Server 2023.1.8Risk Level:4.2Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Devolutions Server could allow a remote authenticated attacker to obtain...

Read MoreRead more about Devolutions Server information disclosure | CVE-2023-2400
CVE-prog
  • Vulnerabilities

Node.js security bypass | CVE-2023-30584

June 22, 2023

NAME__________Node.js security bypassPlatforms Affected:Node.js Node.js 20.0Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Node.js could allow a remote attacker to bypass security restrictions, caused by...

Read MoreRead more about Node.js security bypass | CVE-2023-30584
CVE-prog
  • Vulnerabilities

Online School Fees System SQL injection | CVE-2023-3340

June 22, 2023

NAME__________Online School Fees System SQL injectionPlatforms Affected:Sourcecodester Online School Fees System 1.0Risk Level:6.3Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Online School Fees System is vulnerable...

Read MoreRead more about Online School Fees System SQL injection | CVE-2023-3340
CVE-prog
  • Vulnerabilities

ISC BIND denial of service | CVE-2023-2828

June 22, 2023

NAME__________ISC BIND denial of servicePlatforms Affected:ISC BIND 9.18.0 ISC BIND 9.19.0 ISC BIND 9.16.12Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________ISC BIND is...

Read MoreRead more about ISC BIND denial of service | CVE-2023-2828
CVE-prog
  • Vulnerabilities

Album Photos module for Drupal security bypass |

June 22, 2023

NAME__________Album Photos module for Drupal security bypassPlatforms Affected:Drupal Album Photos module for Drupal 6.0 Drupal Album Photos module for Drupal...

Read MoreRead more about Album Photos module for Drupal security bypass |
CVE-prog
  • Vulnerabilities

Civic Cookie Control module for Drupal cross-site scripting |

June 22, 2023

NAME__________Civic Cookie Control module for Drupal cross-site scriptingPlatforms Affected:Drupal Civic Cookie Control module for Drupal 4.4.12 Drupal Civic Cookie Control...

Read MoreRead more about Civic Cookie Control module for Drupal cross-site scripting |
CVE-prog
  • Vulnerabilities

Cisco Duo Two-Factor Authentication for macOS security bypass | CVE-2023-20199

June 22, 2023

NAME__________Cisco Duo Two-Factor Authentication for macOS security bypassPlatforms Affected:Cisco Duo Two-Factor Authentication for macOSRisk Level:6.2Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Cisco Duo Two-Factor Authentication...

Read MoreRead more about Cisco Duo Two-Factor Authentication for macOS security bypass | CVE-2023-20199
CVE-prog
  • Vulnerabilities

Cisco Secure Email and Web Manager and Cisco Secure Web Appliance cross-site scripting | CVE-2023-20028

June 22, 2023

NAME__________Cisco Secure Email and Web Manager and Cisco Secure Web Appliance cross-site scriptingPlatforms Affected:Cisco Secure Email and Web Manager Cisco...

Read MoreRead more about Cisco Secure Email and Web Manager and Cisco Secure Web Appliance cross-site scripting | CVE-2023-20028
CVE-prog
  • Vulnerabilities

Apache Tomcat information disclosure | CVE-2023-34981

June 22, 2023

NAME__________Apache Tomcat information disclosurePlatforms Affected:Apache Tomcat 8.5.88 Apache Tomcat 9.0.74 Apache Tomcat 10.1.8 Apache Tomcat 11.0.0-M5Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Apache Tomcat...

Read MoreRead more about Apache Tomcat information disclosure | CVE-2023-34981
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS and Junos OS Evolved denial of service | CVE-2023-0026

June 22, 2023

NAME__________Juniper Networks Junos OS and Junos OS Evolved denial of servicePlatforms Affected:Juniper Networks Junos OS Juniper Networks Junos OS EvolvedRisk...

Read MoreRead more about Juniper Networks Junos OS and Junos OS Evolved denial of service | CVE-2023-0026
CVE-prog
  • Vulnerabilities

Cisco Secure Email and Web Manager cross-site scripting | CVE-2023-20119

June 22, 2023

NAME__________Cisco Secure Email and Web Manager cross-site scriptingPlatforms Affected:Cisco Secure Email and Web ManagerRisk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Cisco Secure Email and...

Read MoreRead more about Cisco Secure Email and Web Manager cross-site scripting | CVE-2023-20119
CVE-prog
  • Vulnerabilities

Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance cross-site scripting | CVE-2023-20120

June 22, 2023

NAME__________Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance cross-site scriptingPlatforms Affected:Cisco Secure Email...

Read MoreRead more about Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance cross-site scripting | CVE-2023-20120
CVE-prog
  • Vulnerabilities

ISC BIND denial of service | CVE-2023-2911

June 22, 2023

NAME__________ISC BIND denial of servicePlatforms Affected:ISC BIND 9.18.0 ISC BIND 9.16.12Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________ISC BIND is vulnerable to a...

Read MoreRead more about ISC BIND denial of service | CVE-2023-2911
iStock-157376843
  • NCSC
  • News

Protecting how you administer cloud services

June 22, 2023

Protecting how you administer cloud services No matter which cloud service you choose, there are two aspects of your security...

Read MoreRead more about Protecting how you administer cloud services
Legal_blog-100
  • NCSC
  • News

Threats and key takeaways for the legal sector

June 22, 2023

Threats and key takeaways for the legal sector A new https://www.ncsc.gov.uk/report/cyber-threat-report-uk-legal-sector" target="_self">threat report published today reveals why the legal sector...

Read MoreRead more about Threats and key takeaways for the legal sector
China_hacker
  • News

Chinese APT15 hackers resurface with new Graphican malware

June 22, 2023

The Chinese state-sponsored hacking group tracked as APT15 has been observed using a novel backdoor named 'Graphican' in a new...

Read MoreRead more about Chinese APT15 hackers resurface with new Graphican malware
flare-header-telegram
  • News

The Great Exodus to Telegram: A Tour of the New Cybercrime Underground

June 22, 2023

The world of cybercrime is moving quickly. Threat actors, ransomware gangs, malware developers, and others are increasingly and rapidly moving...

Read MoreRead more about The Great Exodus to Telegram: A Tour of the New Cybercrime Underground
Amazon_prime
  • News

FTC: Amazon trapped millions into hard-to-cancel Prime memberships

June 22, 2023

The Federal Trade Commission (FTC) says Amazon allegedly used dark patterns to trick millions of users into enrolling in its...

Read MoreRead more about FTC: Amazon trapped millions into hard-to-cancel Prime memberships
Cisco
  • News

Exploit released for Cisco AnyConnect bug giving SYSTEM privileges

June 22, 2023

Proof-of-concept exploit code is now available for a high-severity flaw in Cisco Secure Client Software for Windows (formerly AnyConnect Secure...

Read MoreRead more about Exploit released for Cisco AnyConnect bug giving SYSTEM privileges
UPS_glitchy
  • News

UPS discloses data breach after exposed customer info used in SMS phishing

June 22, 2023

Multinational shipping company UPS is alerting Canadian customers that some of their personal information might have been exposed via its...

Read MoreRead more about UPS discloses data breach after exposed customer info used in SMS phishing
iottie
  • News

iOttie discloses data breach after site hacked to steal credit cards

June 22, 2023

Car mount and mobile accessory maker iOttie warns that its site was compromised for almost two months to steal online...

Read MoreRead more about iOttie discloses data breach after site hacked to steal credit cards
CISA_Logo
  • CISA

CISA: CISA and NSA Release Joint Guidance on Hardening Baseboard Management Controllers (BMCs)

June 22, 2023

CISA and NSA Release Joint Guidance on Hardening Baseboard Management Controllers (BMCs) Today, CISA, together with the National Security Agency...

Read MoreRead more about CISA: CISA and NSA Release Joint Guidance on Hardening Baseboard Management Controllers (BMCs)

Posts pagination

Previous 1 … 2,409 2,410 2,411 2,412 2,413 2,414 2,415 … 4,504 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Elliott Tax Service

November 4, 2025
image
  • Data Breach
  • Ransomware

[RHYSIDA] – Ransomware Victim: Automated Logistics Systems

November 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Benda Grace Stulz

November 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Palacios Marine & Industrial

November 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: General Micro Systems

November 4, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel