Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of June 2, 2025

June 9, 2025

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...

Read MoreRead more about US-CERT Vulnerability Summary for the Week of June 2, 2025
image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: Hartwig Mechanical Inc

June 9, 2025

Ransomware Group: MEDUSA VICTIM NAME: Hartwig Mechanical Inc NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [MEDUSA] – Ransomware Victim: Hartwig Mechanical Inc
image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: San Jose Country Club

June 9, 2025

Ransomware Group: MEDUSA VICTIM NAME: San Jose Country Club NOTE: No files or stolen information are by RedPacket Security. Any...

Read MoreRead more about [MEDUSA] – Ransomware Victim: San Jose Country Club
image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: Bumfords

June 9, 2025

Ransomware Group: MEDUSA VICTIM NAME: Bumfords NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [MEDUSA] – Ransomware Victim: Bumfords
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Homestead Gardens

June 9, 2025

Ransomware Group: PLAY VICTIM NAME: Homestead Gardens NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [PLAY] – Ransomware Victim: Homestead Gardens
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Community Choice Credit Union

June 9, 2025

Ransomware Group: PLAY VICTIM NAME: Community Choice Credit Union NOTE: No files or stolen information are by RedPacket Security. Any...

Read MoreRead more about [PLAY] – Ransomware Victim: Community Choice Credit Union
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: path-traversal-vulnerability-in-lila-project-immm

June 9, 2025

Company Name: Lichess Company HackerOne URL: https://hackerone.com/lichess Submitted By:immmLink to Submitters Profile:https://hackerone.com/immm Report Title:Path Traversal Vulnerability in Lila ProjectReport Link:https://hackerone.com/reports/3181066Date...

Read MoreRead more about HackerOne Bug Bounty Disclosure: path-traversal-vulnerability-in-lila-project-immm
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: dugoni

June 9, 2025

Ransomware Group: QILIN VICTIM NAME: dugoni NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: dugoni
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: girv

June 9, 2025

Ransomware Group: QILIN VICTIM NAME: girv NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: girv
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: NyN

June 9, 2025

Ransomware Group: AKIRA VICTIM NAME: NyN NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [AKIRA] – Ransomware Victim: NyN
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: ecoter

June 9, 2025

Ransomware Group: QILIN VICTIM NAME: ecoter NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [QILIN] – Ransomware Victim: ecoter
image
  • Vulnerabilities

CVE Alert: CVE-2025-20063

June 9, 2025

Vulnerability Summary: CVE-2025-20063 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion. Affected...

Read MoreRead more about CVE Alert: CVE-2025-20063
image
  • Vulnerabilities

CVE Alert: CVE-2025-23235

June 9, 2025

Vulnerability Summary: CVE-2025-23235 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read. Affected Endpoints:...

Read MoreRead more about CVE Alert: CVE-2025-23235
image
  • Vulnerabilities

CVE Alert: CVE-2025-24493

June 9, 2025

Vulnerability Summary: CVE-2025-24493 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition. Affected...

Read MoreRead more about CVE Alert: CVE-2025-24493
image
  • Vulnerabilities

CVE Alert: CVE-2025-25217

June 9, 2025

Vulnerability Summary: CVE-2025-25217 in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. Affected...

Read MoreRead more about CVE Alert: CVE-2025-25217
image
  • Vulnerabilities

CVE Alert: CVE-2025-21082

June 9, 2025

Vulnerability Summary: CVE-2025-21082 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion. Affected...

Read MoreRead more about CVE Alert: CVE-2025-21082
image
  • Vulnerabilities

CVE Alert: CVE-2025-27247

June 9, 2025

Vulnerability Summary: CVE-2025-27247 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. Affected...

Read MoreRead more about CVE Alert: CVE-2025-27247
image
  • Vulnerabilities

CVE Alert: CVE-2025-27131

June 9, 2025

Vulnerability Summary: CVE-2025-27131 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. Affected Endpoints:...

Read MoreRead more about CVE Alert: CVE-2025-27131
image
  • Vulnerabilities

CVE Alert: CVE-2025-27563

June 9, 2025

Vulnerability Summary: CVE-2025-27563 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. Affected...

Read MoreRead more about CVE Alert: CVE-2025-27563
image
  • Vulnerabilities

CVE Alert: CVE-2025-26693

June 9, 2025

Vulnerability Summary: CVE-2025-26693 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. Affected...

Read MoreRead more about CVE Alert: CVE-2025-26693
image
  • Vulnerabilities

CVE Alert: CVE-2025-27242

June 9, 2025

Vulnerability Summary: CVE-2025-27242 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. Affected Endpoints:...

Read MoreRead more about CVE Alert: CVE-2025-27242
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: Al Tadawi Specialty Hospital

June 9, 2025

Ransomware Group: NIGHTSPIRE VICTIM NAME: Al Tadawi Specialty Hospital NOTE: No files or stolen information are by RedPacket Security. Any...

Read MoreRead more about [NIGHTSPIRE] – Ransomware Victim: Al Tadawi Specialty Hospital
image
  • Vulnerabilities

CVE Alert: CVE-2025-26691

June 9, 2025

Vulnerability Summary: CVE-2025-26691 in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. Affected...

Read MoreRead more about CVE Alert: CVE-2025-26691
image
  • Vulnerabilities

CVE Alert: CVE-2025-35005

June 9, 2025

Vulnerability Summary: CVE-2025-35005 Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in...

Read MoreRead more about CVE Alert: CVE-2025-35005

Posts pagination

Previous 1 … 268 269 270 271 272 273 274 … 4,419 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 39[.]104[.]78[.]25:8443

September 21, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 39[.]105[.]165[.]37:80

September 21, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 156[.]238[.]243[.]109:6443

September 21, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]121[.]137[.]8:80

September 21, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 221[.]132[.]29[.]137:80

September 21, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel