Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025
unlock_membership
  • Premium Members Content

Secure by Design A Practical Guide to Supply Chain Security for Modern Businesses

August 29, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Microsoft Office Visio information disclosure |

May 11, 2023

NAME__________Microsoft Office Visio information disclosurePlatforms Affected:Microsoft VisioRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Microsoft Office Visio could allow a remote attacker to obtain sensitive...

Read MoreRead more about Microsoft Office Visio information disclosure |
CVE-prog
  • Vulnerabilities

Tenda IP Camera CP3 information disclosure | CVE-2023-30352

May 11, 2023

NAME__________Tenda IP Camera CP3 information disclosurePlatforms Affected:Tenda IP Camera CP3 11.10.00.2211041355Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Tenda IP Camera CP3 could allow a...

Read MoreRead more about Tenda IP Camera CP3 information disclosure | CVE-2023-30352
CVE-prog
  • Vulnerabilities

Palo Alto Networks PAN-OS information disclosure | CVE-2023-0008

May 11, 2023

NAME__________Palo Alto Networks PAN-OS information disclosurePlatforms Affected:Palo Alto Networks PAN-OS 9.0.0 Palo Alto Networks PAN-OS 8.1 Palo Alto Networks PAN-OS...

Read MoreRead more about Palo Alto Networks PAN-OS information disclosure | CVE-2023-0008
CVE-prog
  • Vulnerabilities

OpenStack Cinder, Glance_store, Nova and Os-brick information disclosure | CVE-2023-2088

May 11, 2023

NAME__________OpenStack Cinder, Glance_store, Nova and Os-brick information disclosurePlatforms Affected:OpenStack Nova 26.0.0 OpenStack Nova 27.0.0 OpenStack Cinder 21.0.0 OpenStack Cinder 22.0.0...

Read MoreRead more about OpenStack Cinder, Glance_store, Nova and Os-brick information disclosure | CVE-2023-2088
CVE-prog
  • Vulnerabilities

Intel IPP Cryptography software information disclosure | CVE-2022-37409

May 11, 2023

NAME__________Intel IPP Cryptography software information disclosurePlatforms Affected:Intel IPP Cryptography software 2021.6Risk Level:4.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Intel IPP Cryptography software could allow a...

Read MoreRead more about Intel IPP Cryptography software information disclosure | CVE-2022-37409
CVE-prog
  • Vulnerabilities

MicroEngine Mailform file upload | CVE-2023-27397

May 11, 2023

NAME__________MicroEngine Mailform file uploadPlatforms Affected:MicroEngine Mailform 1.1.8Risk Level:3.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________MicroEngine Mailform could allow a remote authenticated attacker to upload arbitrary...

Read MoreRead more about MicroEngine Mailform file upload | CVE-2023-27397
CVE-prog
  • Vulnerabilities

Chamilo LMS cross-site scripting | CVE-2023-31803

May 11, 2023

NAME__________Chamilo LMS cross-site scriptingPlatforms Affected:Chamilo Chamilo LMS 1.11.13Risk Level:5Exploitability:HighConsequences:Gain Access DESCRIPTION__________Chamilo LMS is vulnerable to cross-site scripting, caused by improper...

Read MoreRead more about Chamilo LMS cross-site scripting | CVE-2023-31803
CVE-prog
  • Vulnerabilities

Tenda IP Camera CP3 security bypass | CVE-2023-30354

May 11, 2023

NAME__________Tenda IP Camera CP3 security bypassPlatforms Affected:Tenda IP Camera CP3 11.10.00.2211041355Risk Level:6.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Tenda IP Camera CP3 could allow a...

Read MoreRead more about Tenda IP Camera CP3 security bypass | CVE-2023-30354
CVE-prog
  • Vulnerabilities

Weston Embedded uC-FTPs security bypass | CVE-2022-41985

May 11, 2023

NAME__________Weston Embedded uC-FTPs security bypassPlatforms Affected:Weston Embedded uC-FTPs 1.98.00Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Weston Embedded uC-FTPs could allow a remote attacker to...

Read MoreRead more about Weston Embedded uC-FTPs security bypass | CVE-2022-41985
9c908d13286533c4a1eddaba416c24b11930514b5ea1d2ee624ee22b145cdfb0
  • News

GitHub Extends Push Protection to Prevent Accidental Leaks of Keys and Other Secrets

May 11, 2023

GitHub has announced the general availability of a new security feature called push protection, which aims to prevent developers from...

Read MoreRead more about GitHub Extends Push Protection to Prevent Accidental Leaks of Keys and Other Secrets
1292fa0c1c904469a7daa311ca0ac498a9b9ad37ac8b37428c1e274df67df01f
  • News

Andoryu Botnet Exploits Critical Ruckus Wireless Flaw for Widespread Attack

May 11, 2023

A nascent botnet called Andoryu has been found to exploit a now-patched critical security flaw in the Ruckus Wireless Admin...

Read MoreRead more about Andoryu Botnet Exploits Critical Ruckus Wireless Flaw for Widespread Attack
b6fccc9253eff8f2013f59997abb8cd4fb023668826450c303c084388411e587
  • News

Twitter Finally Rolling Out Encrypted Direct Messages — Starting with Verified Users

May 11, 2023

Twitter is officially beginning to roll out support for encrypted direct messages (DMs) on the platform, more than six months...

Read MoreRead more about Twitter Finally Rolling Out Encrypted Direct Messages — Starting with Verified Users
iStock-681629516
  • NCSC
  • News

Why more transparency around cyber attacks is a good thing for everyone

May 11, 2023

Why more transparency around cyber attacks is a good thing for everyone At the NCSC and ICO, we deal with...

Read MoreRead more about Why more transparency around cyber attacks is a good thing for everyone
cyber-security-1805632_1280
  • News

Hacker ‘PlugwalkJoe’ pleads guilty to 2020 Twitter breach

May 11, 2023

Joseph James O'Connor, aka 'PlugwalkJoke,' has pleaded guilty to multiple cybercrime offenses, including SIM swapping attacks, cyberstalking, computer hacking, and...

Read MoreRead more about Hacker ‘PlugwalkJoe’ pleads guilty to 2020 Twitter breach
cyber-security-1805632_1280
  • News

New ‘Greatness’ service simplifies Microsoft 365 phishing attacks

May 11, 2023

The Phishing-as-a-Service (PhaaS) platform named 'Greatness' has seen a spike in activity as it targets organizations using Microsoft 365 in...

Read MoreRead more about New ‘Greatness’ service simplifies Microsoft 365 phishing attacks
cyber-security-1805632_1280
  • News

Top 5 Password Cracking Techniques Used by Hackers

May 11, 2023

One of the biggest security threats is password cracking. Are you an IT system administrator concerned about the security of...

Read MoreRead more about Top 5 Password Cracking Techniques Used by Hackers
cyber-security-1805632_1280
  • News

RapperBot DDoS malware adds cryptojacking as new revenue stream

May 11, 2023

New samples of the RapperBot botnet malware have added cryptojacking capabilites to mine for cryptocurrency on compromised Intel x64 machines....

Read MoreRead more about RapperBot DDoS malware adds cryptojacking as new revenue stream
cyber-security-1805632_1280
  • News

New ransomware decryptor recovers data from partially encrypted files

May 11, 2023

A new 'White Phoenix' ransomware decryptor allows victims to partially recover files encrypted by ransomware strains that use intermittent encryption....

Read MoreRead more about New ransomware decryptor recovers data from partially encrypted files
cyber-security-1805632_1280
  • News

North Korean hackers breached major hospital in Seoul to steal data

May 11, 2023

The Korean National Police Agency (KNPA) warned that North Korean hackers had breached the network of one of the country's...

Read MoreRead more about North Korean hackers breached major hospital in Seoul to steal data
cyber-security-1805632_1280
  • News

Cybersecurity firm Dragos discloses cybersecurity incident, extortion attempt

May 11, 2023

Industrial cybersecurity company Dragos today disclosed what it describes as a "cybersecurity event" after a known cybercrime gang attempted to...

Read MoreRead more about Cybersecurity firm Dragos discloses cybersecurity incident, extortion attempt
cyber-security-1805632_1280
  • News

Fake in-browser Windows updates push Aurora info-stealer malware

May 11, 2023

A recently spotted malvertising campaign tricked users with an in-browser Windows update simulation to deliver the Aurora information stealing malware....

Read MoreRead more about Fake in-browser Windows updates push Aurora info-stealer malware
HIBP-Banner-1
  • Data Breach

RentoMojo – 2,185,697 breached accounts

May 11, 2023

HIBP In April 2023, the Indian rental service RentoMojo suffered a data breach. The breach exposed over 2M unique email...

Read MoreRead more about RentoMojo – 2,185,697 breached accounts
CISA_Logo
  • CISA

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

May 11, 2023

CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...

Read MoreRead more about CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA_Logo
  • CISA

CISA: CISA Requests for Comment on Secure Software Self-Attestation Form

May 11, 2023

CISA Requests for Comment on Secure Software Self-Attestation Form CISA has issued requests for comment on the Secure Software Self-Attestation...

Read MoreRead more about CISA: CISA Requests for Comment on Secure Software Self-Attestation Form

Posts pagination

Previous 1 … 2,466 2,467 2,468 2,469 2,470 2,471 2,472 … 4,406 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54111 – Microsoft – Windows 10 Version 1809

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54106 – Microsoft – Windows Server 2019

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54110 – Microsoft – Windows 10 Version 1809

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54112 – Microsoft – Windows 10 Version 1809

September 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel