Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Secure by Design A Practical Guide to Supply Chain Security for Modern Businesses

August 29, 2025
unlock_membership
  • Premium Members Content

Endpoint Protection Reimagined for Modern Enterprises

August 27, 2025
unlock_membership
  • Premium Members Content

Privacy by Design A Practical Guide to Data Protection in a Connected World

August 25, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Vulnerabilities

CVE Alert: CVE-2025-27701

May 28, 2025

Vulnerability Summary: CVE-2025-27701 In the function process_crypto_cmd, the values of ptrs can be potentially equal to NULL which is valid...

Read MoreRead more about CVE Alert: CVE-2025-27701
image
  • Vulnerabilities

CVE Alert: CVE-2025-5245

May 28, 2025

Vulnerability Summary: CVE-2025-5245 A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the...

Read MoreRead more about CVE Alert: CVE-2025-5245
image
  • Vulnerabilities

CVE Alert: CVE-2025-5248

May 28, 2025

Vulnerability Summary: CVE-2025-5248 A vulnerability, which was classified as critical, was found in PHPGurukul Company Visitor Management System 1.0. Affected...

Read MoreRead more about CVE Alert: CVE-2025-5248
image
  • Vulnerabilities

CVE Alert: CVE-2025-23247

May 28, 2025

Vulnerability Summary: CVE-2025-23247 NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a failure to...

Read MoreRead more about CVE Alert: CVE-2025-23247
image
  • Vulnerabilities

CVE Alert: CVE-2025-27700

May 28, 2025

Vulnerability Summary: CVE-2025-27700 There is a possible bypass of carrier restrictions due to an unusual root cause. This could lead...

Read MoreRead more about CVE Alert: CVE-2025-27700
image
  • Vulnerabilities

CVE Alert: CVE-2025-5250

May 28, 2025

Vulnerability Summary: CVE-2025-5250 A vulnerability was found in PHPGurukul News Portal Project 4.1 and classified as critical. Affected by this...

Read MoreRead more about CVE Alert: CVE-2025-5250
image
  • Vulnerabilities

CVE Alert: CVE-2025-5249

May 28, 2025

Vulnerability Summary: CVE-2025-5249 A vulnerability has been found in PHPGurukul News Portal Project 4.1 and classified as critical. Affected by...

Read MoreRead more about CVE Alert: CVE-2025-5249
image
  • Vulnerabilities

CVE Alert: CVE-2024-13966

May 28, 2025

Vulnerability Summary: CVE-2024-13966 ZKTeco BioTime allows unauthenticated attackers to enumerate usernames and log in as any user with a password...

Read MoreRead more about CVE Alert: CVE-2024-13966
image
  • Vulnerabilities

CVE Alert: CVE-2025-5251

May 28, 2025

Vulnerability Summary: CVE-2025-5251 A vulnerability was found in PHPGurukul News Portal Project 4.1. It has been classified as critical. This...

Read MoreRead more about CVE Alert: CVE-2025-5251
image
  • Vulnerabilities

CVE Alert: CVE-2025-5252

May 28, 2025

Vulnerability Summary: CVE-2025-5252 A vulnerability was found in PHPGurukul News Portal Project 4.1. It has been declared as critical. This...

Read MoreRead more about CVE Alert: CVE-2025-5252
image
  • Vulnerabilities

CVE Alert: CVE-2025-45529

May 28, 2025

Vulnerability Summary: CVE-2025-45529 An arbitrary file read vulnerability in the ReadTextAsynchronous function of SSCMS v7.3.1 allows attackers to read arbitrary...

Read MoreRead more about CVE Alert: CVE-2025-45529
image
  • Vulnerabilities

CVE Alert: CVE-2025-5198

May 28, 2025

Vulnerability Summary: CVE-2025-5198 A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script...

Read MoreRead more about CVE Alert: CVE-2025-5198
image
  • Vulnerabilities

CVE Alert: CVE-2025-46173

May 28, 2025

Vulnerability Summary: CVE-2025-46173 code-projects Online Exam Mastering System 1.0 is vulnerable to Cross Site Scripting (XSS) via the name field...

Read MoreRead more about CVE Alert: CVE-2025-46173
image
  • Vulnerabilities

CVE Alert: CVE-2025-5222

May 28, 2025

Vulnerability Summary: CVE-2025-5222 A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb...

Read MoreRead more about CVE Alert: CVE-2025-5222
image
  • Vulnerabilities

CVE Alert: CVE-2025-5278

May 28, 2025

Vulnerability Summary: CVE-2025-5278 A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap...

Read MoreRead more about CVE Alert: CVE-2025-5278
image
  • Vulnerabilities

CVE Alert: CVE-2024-11185

May 28, 2025

Vulnerability Summary: CVE-2024-11185 On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain conditions, be...

Read MoreRead more about CVE Alert: CVE-2024-11185
image
  • Vulnerabilities

CVE Alert: CVE-2025-2796

May 28, 2025

Vulnerability Summary: CVE-2025-2796 On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured,...

Read MoreRead more about CVE Alert: CVE-2025-2796
image
  • Vulnerabilities

CVE Alert: CVE-2025-32440

May 28, 2025

Vulnerability Summary: CVE-2025-32440 NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to...

Read MoreRead more about CVE Alert: CVE-2025-32440
image
  • Vulnerabilities

CVE Alert: CVE-2025-2826

May 28, 2025

Vulnerability Summary: CVE-2025-2826 n affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ingress...

Read MoreRead more about CVE Alert: CVE-2025-2826
image
  • Vulnerabilities

CVE Alert: CVE-2024-45094

May 28, 2025

Vulnerability Summary: CVE-2024-45094 IBM DS8900F and DS8A00 Hardware Management Console (HMC) is vulnerable to stored cross-site scripting. This vulnerability allows...

Read MoreRead more about CVE Alert: CVE-2024-45094
3a1315d089068083010f677af9f8b5bb059e429227d3b68dd75367bf1cdbcb4f
  • News

Get A Custom Paint Job For Earbuds At A Nail Salon, Type On A Baguette, Thenbuild A Fountain For Your Pc

May 28, 2025

Computex Taiwan’s Computex conference sprawls across four exhibition halls in which almost 1,500 exhibitors jostle for attention.The Register found time...

Read MoreRead more about Get A Custom Paint Job For Earbuds At A Nail Salon, Type On A Baguette, Thenbuild A Fountain For Your Pc
3057066c2187b114e118dde53b6d6f791142f9383c9681f6ed81a25128770083
  • News

Some Signs Of Ai Model Collapse Begin To Reveal Themselves

May 28, 2025

Opinion I use AI a lot, but not to write stories. I use AI for search. When it comes to...

Read MoreRead more about Some Signs Of Ai Model Collapse Begin To Reveal Themselves
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: kosmas[.]cz

May 28, 2025

Ransomware Group: LYNX VICTIM NAME: kosmascz NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [LYNX] – Ransomware Victim: kosmas[.]cz
unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025

In our increasingly digital world, safeguarding our online presence is more crucial than ever. Virtual Private Networks (VPNs) have become...

Read MoreRead more about Mastering Virtual Private Networks for Enhanced Online Privacy

Posts pagination

Previous 1 … 278 279 280 281 282 283 284 … 4,386 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-9601 – itsourcecode – Apartment Management System

August 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9639 – Ai3 – QbiCRMGateway

August 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8858 – Changing – Clinic Image System

August 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9610 – code-projects – Online Event Judging System

August 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9599 – itsourcecode – Apartment Management System

August 29, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel