Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025
unlock_membership
  • Premium Members Content

Mastering IoT Security Strategies for a Safer Connected World

August 6, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Forensic Analysis in Cybersecurity

August 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Vulnerabilities

CVE Alert: CVE-2025-30101

May 9, 2025

Vulnerability Summary: CVE-2025-30101 Dell PowerScale OneFS, versions 9.8.0.0 through 9.10.1.0, contain a time-of-check time-of-use (TOCTOU) race condition vulnerability. An unauthenticated...

Read MoreRead more about CVE Alert: CVE-2025-30101
image
  • Vulnerabilities

CVE Alert: CVE-2024-13009

May 9, 2025

Vulnerability Summary: CVE-2024-13009 In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be incorrectly released when confronted with a...

Read MoreRead more about CVE Alert: CVE-2024-13009
image
  • Vulnerabilities

CVE Alert: CVE-2025-30102

May 9, 2025

Vulnerability Summary: CVE-2025-30102 Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.1.0, contains an out-of-bounds write vulnerability. A local low privileged attacker...

Read MoreRead more about CVE Alert: CVE-2025-30102
image
  • Vulnerabilities

CVE Alert: CVE-2024-11186

May 9, 2025

Vulnerability Summary: CVE-2024-11186 On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to...

Read MoreRead more about CVE Alert: CVE-2024-11186
image
  • Vulnerabilities

CVE Alert: CVE-2024-12378

May 9, 2025

Vulnerability Summary: CVE-2024-12378 On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in...

Read MoreRead more about CVE Alert: CVE-2024-12378
image
  • Data Breach
  • Ransomware

[LOCKBIT3] – Ransomware Victim: hennessyfunds[.]com

May 9, 2025

Ransomware Group: LOCKBIT3 VICTIM NAME: hennessyfundscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [LOCKBIT3] – Ransomware Victim: hennessyfunds[.]com
image
  • Data Breach
  • Ransomware

[RHYSIDA] – Ransomware Victim: Mountain View Mushrooms

May 9, 2025

Ransomware Group: RHYSIDA VICTIM NAME: Mountain View Mushrooms NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [RHYSIDA] – Ransomware Victim: Mountain View Mushrooms
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Android application that runs a local VPN service to bypass DPI (Deep Packet Inspection) and censorship. This application runs a...

Read MoreRead more about ByeDPIAndroid – App To Bypass Censorship On Android
184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025

Implement and monitor Appsec control at scale. Requirements NodeJS 20.13 Tested on Mac Ubuntu How to install $ git clone...

Read MoreRead more about Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]242[.]200[.]223:80

May 9, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 43[.]242[.]200[.]223:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 148[.]66[.]16[.]230:80

May 9, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 148[.]66[.]16[.]230:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 175[.]178[.]120[.]225:7443

May 9, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 175[.]178[.]120[.]225:7443
image
  • Vulnerabilities

CVE Alert: CVE-2024-9448

May 9, 2025

Vulnerability Summary: CVE-2024-9448 On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets...

Read MoreRead more about CVE Alert: CVE-2024-9448
image
  • Vulnerabilities

CVE Alert: CVE-2025-46712

May 9, 2025

Vulnerability Summary: CVE-2025-46712 Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for...

Read MoreRead more about CVE Alert: CVE-2025-46712
image
  • Vulnerabilities

CVE Alert: CVE-2024-8100

May 9, 2025

Vulnerability Summary: CVE-2024-8100 On affected versions of the Arista CloudVision Portal (CVP on-prem), the time-bound device onboarding token can be...

Read MoreRead more about CVE Alert: CVE-2024-8100
image
  • Vulnerabilities

CVE Alert: CVE-2025-0505

May 9, 2025

Vulnerability Summary: CVE-2025-0505 On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain...

Read MoreRead more about CVE Alert: CVE-2025-0505
image
  • Vulnerabilities

CVE Alert: CVE-2025-27695

May 9, 2025

Vulnerability Summary: CVE-2025-27695 Dell Wyse Management Suite, versions prior to WMS 5.1 contain an Authentication Bypass by Spoofing vulnerability. A...

Read MoreRead more about CVE Alert: CVE-2025-27695
image
  • Vulnerabilities

CVE Alert: CVE-2025-1329

May 9, 2025

Vulnerability Summary: CVE-2025-1329 IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local...

Read MoreRead more about CVE Alert: CVE-2025-1329
image
  • Vulnerabilities

CVE Alert: CVE-2025-46336

May 9, 2025

Vulnerability Summary: CVE-2025-46336 Rack::Session is a session management implementation for Rack. In versions starting from 2.0.0 to before 2.1.1, when...

Read MoreRead more about CVE Alert: CVE-2025-46336
image
  • Vulnerabilities

CVE Alert: CVE-2025-1331

May 9, 2025

Vulnerability Summary: CVE-2025-1331 IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local...

Read MoreRead more about CVE Alert: CVE-2025-1331
image
  • Vulnerabilities

CVE Alert: CVE-2025-1330

May 9, 2025

Vulnerability Summary: CVE-2025-1330 IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local...

Read MoreRead more about CVE Alert: CVE-2025-1330
image
  • Vulnerabilities

CVE Alert: CVE-2025-27720

May 9, 2025

Vulnerability Summary: CVE-2025-27720 The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to...

Read MoreRead more about CVE Alert: CVE-2025-27720
image
  • Data Breach
  • Ransomware

[DEVMAN] – Ransomware Victim: dailynews[.]co[.]th

May 9, 2025

Ransomware Group: DEVMAN VICTIM NAME: dailynewscoth NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [DEVMAN] – Ransomware Victim: dailynews[.]co[.]th
lockbit-flames
  • News

Inside the LockBit Back‑end: what 106 k database rows reveal about the world’s busiest RaaS.

May 9, 2025

How 40 MB of SQL unmasks industrial-scale ransomware operations In a surprising development, it was recently revealed that the notorious...

Read MoreRead more about Inside the LockBit Back‑end: what 106 k database rows reveal about the world’s busiest RaaS.

Posts pagination

Previous 1 … 258 259 260 261 262 263 264 … 4,325 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-50952

August 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-55133

August 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47188

August 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-55134

August 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-56339

August 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel