Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

HAProxy request smuggling | CVE-2023-25950

April 4, 2023

NAME__________HAProxy request smugglingPlatforms Affected:Risk Level:5.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________HAProxy is vulnerable to HTTP request smuggling, caused by improper parsing of HTTP headers...

Read MoreRead more about HAProxy request smuggling | CVE-2023-25950
CVE-prog
  • Vulnerabilities

PDF-XChange Editor code execution | CVE-2023-27341

April 4, 2023

NAME__________PDF-XChange Editor code executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________PDF-XChange Editor could allow a remote attacker to execute arbitrary code on the...

Read MoreRead more about PDF-XChange Editor code execution | CVE-2023-27341
crypto
  • News

Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack

April 4, 2023

The adversary behind the supply chain attack targeting 3CX deployed a second-stage implant specifically singling out a small number of...

Read MoreRead more about Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack
onenote
  • News

Microsoft Tightens OneNote Security by Auto-Blocking 120 Risky File Extensions

April 4, 2023

Microsoft has announced plans to automatically block embedded files with "dangerous extensions" in OneNote following reports that the note-taking service...

Read MoreRead more about Microsoft Tightens OneNote Security by Auto-Blocking 120 Risky File Extensions
Western_Digital_headpic
  • News

Western Digital discloses network breach, My Cloud service down

April 4, 2023

Western Digital announced today that its network has been breached and an unauthorized party gained access to multiple company systems....

Read MoreRead more about Western Digital discloses network breach, My Cloud service down
CISA_headpic
  • News

CISA warns of Zimbra bug exploited in attacks against NATO countries

April 4, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) warned federal agencies to patch a Zimbra Collaboration (ZCS) cross-site scripting flaw exploited...

Read MoreRead more about CISA warns of Zimbra bug exploited in attacks against NATO countries
Bitcoin
  • News

US seizes $112 million from cryptocurrency investment scammers

April 4, 2023

Today, the U.S. Department of Justice seized six virtual currency accounts containing over $112 million in funds stolen in cryptocurrency...

Read MoreRead more about US seizes $112 million from cryptocurrency investment scammers
compressed-folder-light-rays
  • News

WinRAR SFX archives can run PowerShell without being detected

April 4, 2023

Hackers are adding malicious functionality to WinRAR self-extracting archives that contain harmless decoy files, allowing them to plant backdoors without...

Read MoreRead more about WinRAR SFX archives can run PowerShell without being detected
3CX
  • News

Cryptocurrency companies backdoored in 3CX supply chain attack

April 4, 2023

Some of the victims affected by the 3CX supply chain attack have also had their systems backdoored with Gopuram malware,...

Read MoreRead more about Cryptocurrency companies backdoored in 3CX supply chain attack
Capita-logo
  • News

Capita cyberattack disrupted access to its Microsoft Office 365 apps

April 4, 2023

British outsourcing services provider Capita announced today that a cyberattack on Friday prevented access to its internal Microsoft Office 365 applications. London-based...

Read MoreRead more about Capita cyberattack disrupted access to its Microsoft Office 365 apps
CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of March 20, 2023

April 3, 2023

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...

Read MoreRead more about US-CERT Vulnerability Summary for the Week of March 20, 2023
33342172137ed48c47032a6e9c3a70c31144dc9515ca26637f00aec1e2a46986
  • Tools

RedditC2 – Abusing Reddit API To Host The C2 Traffic, Since Most Of The Blue-Team Members Use Reddit, It Might Be A Great Way To Make The Traffic Look Legit

April 3, 2023

Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a...

Read MoreRead more about RedditC2 – Abusing Reddit API To Host The C2 Traffic, Since Most Of The Blue-Team Members Use Reddit, It Might Be A Great Way To Make The Traffic Look Legit
System,Error,Correction,And,Bug,Fixing.,Debugging,The,System,Failure.
  • Premium Members Content

Daily Threat Intelligence – April 03 – 2023

April 3, 2023

The April 18 tax deadline is here and so are scams surrounding it. A cybercrime group identified as TACTICAL#OCTOPUS was...

Read MoreRead more about Daily Threat Intelligence – April 03 – 2023
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: [unibet-com]-delete-messages-via-idor-at-/mom-api/messages/unibet_@unibet/bynaaash

April 3, 2023

Programme HackerOne Kindred Group Kindred Group Submitted by naaash naaash Report Delete messages via IDOR at /mom-api/messages/unibet_@unibet/ Full Report  ...

Read MoreRead more about HackerOne Bug Bounty Disclosure: [unibet-com]-delete-messages-via-idor-at-/mom-api/messages/unibet_@unibet/bynaaash
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: full-account-takeover-on-*-unibet-com-due-to-crossdomain-xml-and-akamaiplayer-loadercontextbyfransrosen

April 3, 2023

Programme HackerOne Kindred Group Kindred Group Submitted by fransrosen fransrosen Report Full Account Takeover on *.unibet.com due to crossdomain.xml and...

Read MoreRead more about HackerOne Bug Bounty Disclosure: full-account-takeover-on-*-unibet-com-due-to-crossdomain-xml-and-akamaiplayer-loadercontextbyfransrosen
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: dangling-dns-record-docs-jitsi-net-(unsuccessful-gsuite-takeover)bybababounty99

April 3, 2023

Programme HackerOne 8x8 Bounty 8x8 Bounty Submitted by bababounty99 bababounty99 Report Dangling DNS Record docs.jitsi.net (unsuccessful GSuite takeover) Full Report...

Read MoreRead more about HackerOne Bug Bounty Disclosure: dangling-dns-record-docs-jitsi-net-(unsuccessful-gsuite-takeover)bybababounty99
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: [www-32red-com]-reverse-proxy-misconfiguration-leads-to-1-click-account-takeoverbysw33tlie

April 3, 2023

Programme HackerOne Kindred Group Kindred Group Submitted by sw33tlie sw33tlie Report Reverse proxy misconfiguration leads to 1-click account takeover Full...

Read MoreRead more about HackerOne Bug Bounty Disclosure: [www-32red-com]-reverse-proxy-misconfiguration-leads-to-1-click-account-takeoverbysw33tlie
secure-vpn
  • News

Crypto-Stealing OpcJacker Malware Targets Users with Fake VPN Service

April 3, 2023

A piece of new information-stealing malware called OpcJacker has been spotted in the wild since the second half of 2022...

Read MoreRead more about Crypto-Stealing OpcJacker Malware Targets Users with Fake VPN Service
wd
  • News

Western Digital Hit by Network Security Breach – Critical Services Disrupted!

April 3, 2023

Data storage devices maker Western Digital on Monday disclosed a "network security incident" that involved unauthorized access to its systems....

Read MoreRead more about Western Digital Hit by Network Security Breach – Critical Services Disrupted!
openai
  • News

Italian Watchdog Bans OpenAI’s ChatGPT Over Data Protection Concerns

April 3, 2023

The Italian data protection watchdog, Garante per la Protezione dei Dati Personali (aka Garante), has imposed a temporary ban of...

Read MoreRead more about Italian Watchdog Bans OpenAI’s ChatGPT Over Data Protection Concerns
pam
  • News

“It’s The Service Accounts, Stupid”: Why Do PAM Deployments Take (almost) Forever To Complete

April 3, 2023

Privileged Access Management (PAM) solutions are regarded as the common practice to prevent identity threats to administrative accounts. In theory,...

Read MoreRead more about “It’s The Service Accounts, Stupid”: Why Do PAM Deployments Take (almost) Forever To Complete
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: gdz[.]com

April 3, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: gdz[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: revvaviation[.]com

April 3, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: revvaviation[.]com
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: – Linux client – Lack of certificate validation leading to RCE – By mmmdspl

April 3, 2023

The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...

Read MoreRead more about BugCrowd Bug Bounty Disclosure: – Linux client – Lack of certificate validation leading to RCE – By mmmdspl

Posts pagination

Previous 1 … 2,613 2,614 2,615 2,616 2,617 2,618 2,619 … 4,412 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of September 8, 2025

September 16, 2025
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: stack-buffer-overflow-in-curl-cookie-parsing-leads-to-rce-batuhanilgarr

September 16, 2025
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P3 – Publicly Editable Google Docs Linked from NASA SnowEx PPT –

September 16, 2025
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P3 – Details of the collaboration between NASA and Inmarsat Government and the type of contract –

September 16, 2025
hkcert
  • HKCERT
  • News

Apple Products Multiple Vulnerabilities

September 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel