Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025
unlock_membership
  • Premium Members Content

Mastering IoT Security Strategies for a Safer Connected World

August 6, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Forensic Analysis in Cybersecurity

August 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]152[.]194[.]88:9443

May 21, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 8[.]152[.]194[.]88:9443
image
  • Vulnerabilities

CVE Alert: CVE-2025-39458

May 21, 2025

Vulnerability Summary: CVE-2025-39458 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes...

Read MoreRead more about CVE Alert: CVE-2025-39458
image
  • Vulnerabilities

CVE Alert: CVE-2025-39459

May 21, 2025

Vulnerability Summary: CVE-2025-39459 Incorrect Privilege Assignment vulnerability in Contempo Themes Real Estate 7 allows Privilege Escalation.This issue affects Real Estate...

Read MoreRead more about CVE Alert: CVE-2025-39459
image
  • Vulnerabilities

CVE Alert: CVE-2025-47577

May 21, 2025

Vulnerability Summary: CVE-2025-47577 Unrestricted Upload of File with Dangerous Type vulnerability in TemplateInvaders TI WooCommerce Wishlist allows Upload a Web...

Read MoreRead more about CVE Alert: CVE-2025-47577
image
  • Vulnerabilities

CVE Alert: CVE-2025-39451

May 21, 2025

Vulnerability Summary: CVE-2025-39451 Missing Authorization vulnerability in Crocoblock JetBlocks For Elementor allows Accessing Functionality Not Properly Constrained by ACLs.This issue...

Read MoreRead more about CVE Alert: CVE-2025-39451
image
  • Vulnerabilities

CVE Alert: CVE-2025-39449

May 21, 2025

Vulnerability Summary: CVE-2025-39449 Missing Authorization vulnerability in Crocoblock JetWooBuilder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JetWooBuilder:...

Read MoreRead more about CVE Alert: CVE-2025-39449
image
  • Vulnerabilities

CVE Alert: CVE-2025-47581

May 21, 2025

Vulnerability Summary: CVE-2025-47581 Deserialization of Untrusted Data vulnerability in Elbisnero WordPress Events Calendar Registration & Tickets allows Object Injection.This issue...

Read MoreRead more about CVE Alert: CVE-2025-47581
image
  • Vulnerabilities

CVE Alert: CVE-2025-47284

May 21, 2025

Vulnerability Summary: CVE-2025-47284 Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was...

Read MoreRead more about CVE Alert: CVE-2025-47284
image
  • Vulnerabilities

CVE Alert: CVE-2025-32924

May 21, 2025

Vulnerability Summary: CVE-2025-32924 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in roninwp Revy allows...

Read MoreRead more about CVE Alert: CVE-2025-32924
image
  • Vulnerabilities

CVE Alert: CVE-2025-43839

May 21, 2025

Vulnerability Summary: CVE-2025-43839 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in shanebp BP Messages Tool allows...

Read MoreRead more about CVE Alert: CVE-2025-43839
image
  • Vulnerabilities

CVE Alert: CVE-2025-47283

May 21, 2025

Vulnerability Summary: CVE-2025-47283 Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was...

Read MoreRead more about CVE Alert: CVE-2025-47283
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: Ertl ELECKTRO FELDBACH

May 21, 2025

Ransomware Group: NIGHTSPIRE VICTIM NAME: Ertl ELECKTRO FELDBACH NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [NIGHTSPIRE] – Ransomware Victim: Ertl ELECKTRO FELDBACH
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: Valentin Hotels

May 21, 2025

Ransomware Group: NIGHTSPIRE VICTIM NAME: Valentin Hotels NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [NIGHTSPIRE] – Ransomware Victim: Valentin Hotels
image
  • Data Breach
  • Ransomware

[RHYSIDA] – Ransomware Victim: Florida Lung

May 20, 2025

Ransomware Group: RHYSIDA VICTIM NAME: Florida Lung NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [RHYSIDA] – Ransomware Victim: Florida Lung
image
  • Vulnerabilities

CVE Alert: CVE-2025-32928

May 20, 2025

Vulnerability Summary: CVE-2025-32928 Deserialization of Untrusted Data vulnerability in ThemeGoods Altair allows Object Injection.This issue affects Altair: from n/a through...

Read MoreRead more about CVE Alert: CVE-2025-32928
image
  • Vulnerabilities

CVE Alert: CVE-2025-39349

May 20, 2025

Vulnerability Summary: CVE-2025-39349 Deserialization of Untrusted Data vulnerability in Potenzaglobalsolutions CiyaShop allows Object Injection.This issue affects CiyaShop: from n/a through...

Read MoreRead more about CVE Alert: CVE-2025-39349
image
  • Vulnerabilities

CVE Alert: CVE-2025-31027

May 20, 2025

Vulnerability Summary: CVE-2025-31027 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jocoxdesign Tiger tiger allows Reflected...

Read MoreRead more about CVE Alert: CVE-2025-31027
image
  • Vulnerabilities

CVE Alert: CVE-2025-32927

May 20, 2025

Vulnerability Summary: CVE-2025-32927 Deserialization of Untrusted Data vulnerability in Chimpstudio FoodBakery allows Object Injection.This issue affects FoodBakery: from n/a through...

Read MoreRead more about CVE Alert: CVE-2025-32927
image
  • Vulnerabilities

CVE Alert: CVE-2025-39348

May 20, 2025

Vulnerability Summary: CVE-2025-39348 Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant WordPress allows Object Injection.This issue affects Grand Restaurant...

Read MoreRead more about CVE Alert: CVE-2025-39348
image
  • Vulnerabilities

CVE Alert: CVE-2025-39365

May 20, 2025

Vulnerability Summary: CVE-2025-39365 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rocket Apps wProject allows Reflected...

Read MoreRead more about CVE Alert: CVE-2025-39365
image
  • Vulnerabilities

CVE Alert: CVE-2025-32925

May 20, 2025

Vulnerability Summary: CVE-2025-32925 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FantasticPlugins...

Read MoreRead more about CVE Alert: CVE-2025-32925
image
  • Vulnerabilities

CVE Alert: CVE-2025-32926

May 20, 2025

Vulnerability Summary: CVE-2025-32926 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThemeGoods Grand Restaurant WordPress...

Read MoreRead more about CVE Alert: CVE-2025-32926
image
  • Vulnerabilities

CVE Alert: CVE-2025-39357

May 20, 2025

Vulnerability Summary: CVE-2025-39357 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla Hospital Management...

Read MoreRead more about CVE Alert: CVE-2025-39357
image
  • Vulnerabilities

CVE Alert: CVE-2025-39356

May 20, 2025

Vulnerability Summary: CVE-2025-39356 Deserialization of Untrusted Data vulnerability in Chimpstudio Foodbakery Sticky Cart allows Object Injection.This issue affects Foodbakery Sticky...

Read MoreRead more about CVE Alert: CVE-2025-39356

Posts pagination

Previous 1 … 240 241 242 243 244 245 246 … 4,328 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-50466

August 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47872

August 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8731

August 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8356

August 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50465

August 9, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel