Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Hitachi Vantara Pentaho Business Analytics Server information disclosure | CVE-2022-43772

April 5, 2023

NAME__________Hitachi Vantara Pentaho Business Analytics Server information disclosurePlatforms Affected:Risk Level:3.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Hitachi Vantara Pentaho Business Analytics Server could allow a...

Read MoreRead more about Hitachi Vantara Pentaho Business Analytics Server information disclosure | CVE-2022-43772
CVE-prog
  • Vulnerabilities

Tribe29 Checkmk information disclosure | CVE-2023-1768

April 5, 2023

NAME__________Tribe29 Checkmk information disclosurePlatforms Affected:Risk Level:3.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Tribe29 Checkmk could allow a remote attacker to obtain sensitive information, caused by...

Read MoreRead more about Tribe29 Checkmk information disclosure | CVE-2023-1768
CVE-prog
  • Vulnerabilities

Grade Point Average (GPA) Calculator information disclosure | CVE-2023-1769

April 5, 2023

NAME__________Grade Point Average (GPA) Calculator information disclosurePlatforms Affected:Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Grade Point Average (GPA) Calculator could allow a remote authenticated...

Read MoreRead more about Grade Point Average (GPA) Calculator information disclosure | CVE-2023-1769
CVE-prog
  • Vulnerabilities

Microsoft 3D Builder code execution |

April 5, 2023

NAME__________Microsoft 3D Builder code executionPlatforms Affected:Microsoft 3D BuilderRisk Level:6.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft 3D Builder could allow a remote attacker to execute...

Read MoreRead more about Microsoft 3D Builder code execution |
CVE-prog
  • Vulnerabilities

Grade Point Average (GPA) Calculator SQL injection | CVE-2023-1770

April 5, 2023

NAME__________Grade Point Average (GPA) Calculator SQL injectionPlatforms Affected:Risk Level:6.3Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION__________Grade Point Average (GPA) Calculator is vulnerable to SQL injection....

Read MoreRead more about Grade Point Average (GPA) Calculator SQL injection | CVE-2023-1770
CVE-prog
  • Vulnerabilities

Microsoft 3D Builder information disclosure |

April 5, 2023

NAME__________Microsoft 3D Builder information disclosurePlatforms Affected:Microsoft 3D BuilderRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Microsoft 3D Builder could allow a remote attacker to obtain...

Read MoreRead more about Microsoft 3D Builder information disclosure |
CVE-prog
  • Vulnerabilities

Hitachi Vantara Pentaho Business Analytics Server directory traversal | CVE-2022-43771

April 5, 2023

NAME__________Hitachi Vantara Pentaho Business Analytics Server directory traversalPlatforms Affected:Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Hitachi Vantara Pentaho Business Analytics Server could allow a...

Read MoreRead more about Hitachi Vantara Pentaho Business Analytics Server directory traversal | CVE-2022-43771
CVE-prog
  • Vulnerabilities

ADMesh buffer overflow | CVE-2022-38072

April 5, 2023

NAME__________ADMesh buffer overflowPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ADMesh is vulnerable to a heap-based buffer overflow, caused by improper array index validation...

Read MoreRead more about ADMesh buffer overflow | CVE-2022-38072
CVE-prog
  • Vulnerabilities

National land numerical information data conversion tool | CVE-2023-25955

April 5, 2023

NAME__________National land numerical information data conversion toolPlatforms Affected:Risk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________National land numerical information data conversion tool is vulnerable to...

Read MoreRead more about National land numerical information data conversion tool | CVE-2023-25955
CVE-prog
  • Vulnerabilities

JustSystems products buffer overflow | CVE-2022-45115

April 5, 2023

NAME__________JustSystems products buffer overflowPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________JustSystems products is vulnerable to a buffer overflow, caused by improper bounds checking....

Read MoreRead more about JustSystems products buffer overflow | CVE-2022-45115
CVE-prog
  • Vulnerabilities

NetComm NF20MESH, NF20, and NL1902 routers security bypass | CVE-2022-4874

April 5, 2023

NAME__________NetComm NF20MESH, NF20, and NL1902 routers security bypassPlatforms Affected:NetComm NF20MESH NetComm NF20 NetComm NL1902Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________NetComm NF20MESH, NF20, and...

Read MoreRead more about NetComm NF20MESH, NF20, and NL1902 routers security bypass | CVE-2022-4874
CVE-prog
  • Vulnerabilities

Nexx Smart Home devices security bypass | CVE-2023-1750

April 5, 2023

NAME__________Nexx Smart Home devices security bypassPlatforms Affected:Risk Level:7.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Nexx Smart Home devices could allow a remote authenticated attacker to...

Read MoreRead more about Nexx Smart Home devices security bypass | CVE-2023-1750
CVE-prog
  • Vulnerabilities

JustSystems products code execution | CVE-2022-43664

April 5, 2023

NAME__________JustSystems products code executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________JustSystems products could allow a remote attacker to execute arbitrary code on the...

Read MoreRead more about JustSystems products code execution | CVE-2022-43664
CVE-prog
  • Vulnerabilities

JustSystems products buffer overflow | CVE-2023-22660

April 5, 2023

NAME__________JustSystems products buffer overflowPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________JustSystems products is vulnerable to a buffer overflow, caused by improper bounds checking....

Read MoreRead more about JustSystems products buffer overflow | CVE-2023-22660
CVE-prog
  • Vulnerabilities

Nexx Smart Home devices security bypass | CVE-2023-1749

April 5, 2023

NAME__________Nexx Smart Home devices security bypassPlatforms Affected:Risk Level:6.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Nexx Smart Home devices could allow a remote authenticated attacker to...

Read MoreRead more about Nexx Smart Home devices security bypass | CVE-2023-1749
CVE-prog
  • Vulnerabilities

JustSystems products code execution | CVE-2023-22291

April 5, 2023

NAME__________JustSystems products code executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________JustSystems products could allow a remote attacker to execute arbitrary code on the...

Read MoreRead more about JustSystems products code execution | CVE-2023-22291
CVE-prog
  • Vulnerabilities

Nexx Smart Home devices information disclosure | CVE-2023-1751

April 5, 2023

NAME__________Nexx Smart Home devices information disclosurePlatforms Affected:Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Nexx Smart Home devices could allow a remote attacker to obtain...

Read MoreRead more about Nexx Smart Home devices information disclosure | CVE-2023-1751
traffic
  • News

New Rorschach ransomware is the fastest encryptor seen so far

April 5, 2023

Following a cyberattack on a U.S.-based company, malware researchers discovered what appears to be a new ransomware strain with "technically unique features,"...

Read MoreRead more about New Rorschach ransomware is the fastest encryptor seen so far
0_veritas-logo
  • News

ALPHV ransomware exploits Veritas Backup Exec bugs for initial access

April 5, 2023

An ALPHV/BlackCat ransomware affiliate was observed exploiting three vulnerabilities impacting the Veritas Backup product for initial access to the target network. The...

Read MoreRead more about ALPHV ransomware exploits Veritas Backup Exec bugs for initial access
taxes
  • News

IRS-authorized eFile.com tax return software caught serving JS malware

April 5, 2023

eFile.com, an IRS-authorized e-file software service provider used by many for filing their tax returns, has been caught serving JavaScript...

Read MoreRead more about IRS-authorized eFile.com tax return software caught serving JS malware
HP-Printer-Logo
  • News

HP to patch critical bug in LaserJet printers within 90 days

April 5, 2023

HP announced in a security bulletin this week that it would take up to 90 days to patch a critical-severity...

Read MoreRead more about HP to patch critical bug in LaserJet printers within 90 days
FBI
  • News

FBI seizes stolen credentials market Genesis in Operation Cookie Monster

April 5, 2023

The domains for Genesis Market, one of the most popular marketplaces for stolen credentials of all types, were seized by...

Read MoreRead more about FBI seizes stolen credentials market Genesis in Operation Cookie Monster
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: – Auth.Tesla.com Account Takeover of Internal Tesla Accounts – By evanconnelly

April 5, 2023

The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...

Read MoreRead more about BugCrowd Bug Bounty Disclosure: – Auth.Tesla.com Account Takeover of Internal Tesla Accounts – By evanconnelly
CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of March 20, 2023

April 4, 2023

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...

Read MoreRead more about US-CERT Vulnerability Summary for the Week of March 20, 2023

Posts pagination

Previous 1 … 2,699 2,700 2,701 2,702 2,703 2,704 2,705 … 4,502 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[ALPHALOCKER] – Ransomware Victim: www[.]myriversidedentaloffice[.]com

November 4, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Irwin Car

November 4, 2025
image
  • Data Breach
  • Ransomware

[DRAGONFORCE] – Ransomware Victim: G[.] Hauswirth Architects

November 4, 2025
image
  • Data Breach
  • Ransomware

[INTERLOCK] – Ransomware Victim: Pinto Coates Kyre & Bowers

November 4, 2025
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: microsoft-x-apikey-exposed-in-mozilla-ci-public-logs-xhacking-z

November 3, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel