Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: buehnen[.]de

March 17, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: buehnen[.]de
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: ktcs[.]com[.]my

March 17, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: ktcs[.]com[.]my
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: r-pac[.]com

March 17, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: r-pac[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: radium[.]com[.]tw

March 17, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: radium[.]com[.]tw
android
  • News

Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware

March 17, 2023

Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android...

Read MoreRead more about Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware
ddos
  • News

New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks

March 17, 2023

A new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers and use...

Read MoreRead more about New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
thn
  • News

THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter

March 17, 2023

Think of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes peeking out from...

Read MoreRead more about THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
layerx-1
  • News

A New Security Category Addresses Web-borne Threats

March 17, 2023

In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser...

Read MoreRead more about A New Security Category Addresses Web-borne Threats
cyber-security-1805632_1280
  • News

LockBit ransomware claims Essendant attack, company says “network outage”

March 17, 2023

LockBit ransomware has claimed a cyber attack on Essendant, a wholesale distributer of office products after a "significant" and ongoing...

Read MoreRead more about LockBit ransomware claims Essendant attack, company says “network outage”
cyber-security-1805632_1280
  • News

FBI: Ransomware hit 860 critical infrastructure orgs in 2022

March 17, 2023

The Federal Bureau of Investigation (FBI) revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of...

Read MoreRead more about FBI: Ransomware hit 860 critical infrastructure orgs in 2022
cyber-security-1805632_1280
  • News

US federal agency hacked using old Telerik bug to steal data

March 17, 2023

Last year, a U.S. federal agency's Microsoft Internet Information Services (IIS) web server was hacked by exploiting a critical .NET...

Read MoreRead more about US federal agency hacked using old Telerik bug to steal data
cyber-security-1805632_1280
  • News

Critical Microsoft Outlook bug PoC shows how easy it is to exploit

March 17, 2023

Security researchers have shared technical details for exploiting a critical Microsoft Outlook vulnerability for Windows (CVE-2023-23397) that allows hackers to remotely...

Read MoreRead more about Critical Microsoft Outlook bug PoC shows how easy it is to exploit
cyber-security-1805632_1280
  • News

Hacker selling data allegedly stolen in US Marshals Service hack

March 17, 2023

A threat actor is selling on a Russian-speaking hacking forum what they claim to be hundreds of gigabytes of data...

Read MoreRead more about Hacker selling data allegedly stolen in US Marshals Service hack
cyber-security-1805632_1280
  • News

CISA warns of Adobe ColdFusion bug exploited as a zero-day

March 17, 2023

CISA has added a critical vulnerability impacting Adobe ColdFusion versions 2021 and 2018 to its catalog of security bugs exploited...

Read MoreRead more about CISA warns of Adobe ColdFusion bug exploited as a zero-day
cyber-security-1805632_1280
  • News

NordVPN open sources its Linux VPN client and libraries

March 17, 2023

Nord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in the hopes...

Read MoreRead more about NordVPN open sources its Linux VPN client and libraries
cyber-security-1805632_1280
  • News

Winter Vivern APT hackers use fake antivirus scans to install malware

March 17, 2023

An advanced hacking group named 'Winter Vivern' targets European government organizations and telecommunication service providers to conduct espionage. The group's...

Read MoreRead more about Winter Vivern APT hackers use fake antivirus scans to install malware
cyber-security-1805632_1280
  • News

Mozilla Firefox gets built-in Firefox Relay controls

March 17, 2023

Mozilla has announced the integration of Firefox Relay, an email protection system that helps users evade trackers and spammers, directly...

Read MoreRead more about Mozilla Firefox gets built-in Firefox Relay controls
cyber-security-1805632_1280
  • News

NordVPN open sources its Linux VPN client and libraries

March 17, 2023

Nord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in the hopes...

Read MoreRead more about NordVPN open sources its Linux VPN client and libraries
cyber-security-1805632_1280
  • News

Latitude cyberattack leads to data theft at two service providers

March 17, 2023

Latitude Financial Services (Latitude) has disclosed a data breach after suffering a cyberattack, causing the company to shut down internal...

Read MoreRead more about Latitude cyberattack leads to data theft at two service providers
cyber-security-1805632_1280
  • News

Microsoft support ‘cracks’ Windows for customer after activation fails

March 17, 2023

In an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows PC after a genuine...

Read MoreRead more about Microsoft support ‘cracks’ Windows for customer after activation fails
cyber-security-1805632_1280
  • News

Conti-based ransomware ‘MeowCorp’ gets free decryptor

March 17, 2023

A decryption tool for a modified version of the Conti ransomware could help hundreds of victims recover their files for...

Read MoreRead more about Conti-based ransomware ‘MeowCorp’ gets free decryptor
cyber-security-1805632_1280
  • News

Convincing Twitter ‘quote tweet’ phone scam targets bank customers

March 17, 2023

A convincing Twitter scam is targeting bank customers by abusing the quote-tweet feature, as observed by BleepingComputer.  What makes this scam stand out is...

Read MoreRead more about Convincing Twitter ‘quote tweet’ phone scam targets bank customers
cyber-security-1805632_1280
  • News

Adobe Acrobat Sign abused to push Redline info-stealing malware

March 17, 2023

Cybercriminals are abusing Adobe Acrobat Sign, an online document signing service, to distribute info-stealing malware to unsuspecting users. The service...

Read MoreRead more about Adobe Acrobat Sign abused to push Redline info-stealing malware
cyber-security-1805632_1280
  • News

FakeCalls Android malware returns with new ways to hide on phones

March 17, 2023

Android malware 'FakeCalls' is circulating again in South Korea, imitating phone calls for over 20 financial organizations and attempting to...

Read MoreRead more about FakeCalls Android malware returns with new ways to hide on phones

Posts pagination

Previous 1 … 2,755 2,756 2,757 2,758 2,759 2,760 2,761 … 4,509 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-11956 – Proliz Software Ltd. Co. – OBS (Student Affairs Information System)

November 6, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: E-First Aid Supplies

November 6, 2025
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: vratatech

November 6, 2025
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: speedmais

November 6, 2025
image
  • Data Breach
  • Ransomware

[NIGHTSPIRE] – Ransomware Victim: Brihta

November 6, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel