Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: KDE

July 12, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: KDE
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: MHIRE

July 12, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: MHIRE
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: WWSTEELE

July 12, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: WWSTEELE
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: Massy Distribution Limited

July 12, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: Massy Distribution Limited
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: Arte Radiotelevisivo Argentino (Artear)

July 12, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: Arte Radiotelevisivo Argentino (Artear)
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: Diskriter

July 12, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: Diskriter
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: NETWORK4CARS

July 12, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: NETWORK4CARS
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: AUM

July 12, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: AUM
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: github-base-action-takeover-which-is-used-in-`github-com/shopify/unity-buy-sdk`bycodermak

July 12, 2022

Programme HackerOne Shopify Shopify Submitted by codermak codermak Report Github base action takeover which is used in `github.com/Shopify/unity-buy-sdk` Full Report...

Read MoreRead more about HackerOne Bug Bounty Disclosure: github-base-action-takeover-which-is-used-in-`github-com/shopify/unity-buy-sdk`bycodermak
CISA_Logo
  • News

US-CERT Bulletin (SB22-192):Vulnerability Summary for the Week of July 4, 2022

July 12, 2022

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...

Read MoreRead more about US-CERT Bulletin (SB22-192):Vulnerability Summary for the Week of July 4, 2022
osint
  • News

Flaws in the ExpressLRS Protocol allow the takeover of drones

July 12, 2022

The protocol for radio-controlled (RC) drones, named ExpressLRS, is affected by vulnerabilities that can allow device takeover. Researchers warn of...

Read MoreRead more about Flaws in the ExpressLRS Protocol allow the takeover of drones
Innovation-brief-640
  • NCSC
  • News

Students tackle tech innovation challenge set by UK cyber experts

July 12, 2022

S Innovative students from around the country put their cyber studies to the test in a unique challenge set by...

Read MoreRead more about Students tackle tech innovation challenge set by UK cyber experts
Welsh-dragon
  • NCSC
  • News

Registration opens for CYBERUK 2022

July 12, 2022

R National Cyber Security Centre’s CYBERUK 2022 event will take place across two days on 10-11 May UK government’s flagship...

Read MoreRead more about Registration opens for CYBERUK 2022
Director-Jeremy-Fleming
  • NCSC
  • News

Director GCHQ on global security amid war in Ukraine

July 12, 2022

D In a speech delivered at the Australian National University, Canberra, Director GCHQ Sir Jeremy Fleming discusses the resolve of...

Read MoreRead more about Director GCHQ on global security amid war in Ukraine
data-centre
  • NCSC
  • News

Joint security guidance offered to data centre operators and users

July 12, 2022

J The National Cyber Security Centre and the Centre for the Protection of National Infrastructure issue guidance to help UK’s...

Read MoreRead more about Joint security guidance offered to data centre operators and users
statement-web-version-green
  • NCSC
  • News

NCSC supports White House call for increased cyber security precautions

July 12, 2022

N The NCSC - a part of GCHQ - has today supported President Biden’s call for increased cyber security vigilance...

Read MoreRead more about NCSC supports White House call for increased cyber security precautions
dominoes-topple
  • NCSC
  • News

Expressions of Interest sought for Cyber Incident Response L2 and Cyber Incident Exercising Scheme

July 12, 2022

E The NCSC is seeking Expressions of Interest (EOI) from organisations interested in applying to become a Delivery Partner for...

Read MoreRead more about Expressions of Interest sought for Cyber Incident Response L2 and Cyber Incident Exercising Scheme
advisory-web-version-blue
  • NCSC
  • News

NCSC advises organisations to act following Russia’s attack on Ukraine

July 12, 2022

N Following Russia’s unprovoked, premeditated attack on Ukraine, the National Cyber Security Centre continues to call on organisations in the...

Read MoreRead more about NCSC advises organisations to act following Russia’s attack on Ukraine
advisory-web-version-teal
  • NCSC
  • News

UK joins international partners to issue advice on latest Russian cyber threat

July 12, 2022

U The UK has today joined international partners to share updated mitigation advice against Russian state-sponsored and criminal cyber threats....

Read MoreRead more about UK joins international partners to issue advice on latest Russian cyber threat
cyberuk-2022-map
  • NCSC
  • News

CYBERUK programme unveiled one month ahead of flagship conference

July 12, 2022

C Whole of society approach to cyber security will be theme of the NCSC’s conference in Wales Sessions will cover...

Read MoreRead more about CYBERUK programme unveiled one month ahead of flagship conference
advisory-web-version-yellow
  • NCSC
  • News

Russia behind cyber attack with Europe-wide impact an hour before Ukraine invasion

July 12, 2022

R Russia has been behind a series of cyber attacks since the start of the renewed invasion of Ukraine, it...

Read MoreRead more about Russia behind cyber attack with Europe-wide impact an hour before Ukraine invasion
dragon-logo-strip
  • NCSC
  • News

International cyber security leaders to appear at flagship UK conference

July 12, 2022

I Top U.S. security officials among the guest speakers at CYBERUK 2022 The National Cyber Security Centre – a part...

Read MoreRead more about International cyber security leaders to appear at flagship UK conference
advisory-web-version-purple
  • NCSC
  • News

NCSC and allies publish advisory on the most commonly exploited vulnerabilities in 2021

July 12, 2022

N UK and international allies share details of the top 15 vulnerabilities routinely exploited by malicious actors in 2021 Advisory...

Read MoreRead more about NCSC and allies publish advisory on the most commonly exploited vulnerabilities in 2021
advisory-web-version-blue-1
  • NCSC
  • News

UK joins international cyber agency partners to release supply chain guidance

July 12, 2022

U Joint advisory sets out practical steps service providers and their customers can take to protect themselves High-profile supply chain...

Read MoreRead more about UK joins international cyber agency partners to release supply chain guidance

Posts pagination

Previous 1 … 3,085 3,086 3,087 3,088 3,089 3,090 3,091 … 4,076 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[BLACKSUIT] – Ransomware Victim: Gloucester County Virginia

May 15, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]92[.]216[.]212:8080

May 15, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 193[.]124[.]41[.]54:80

May 15, 2025
brute_ratel_c4
  • Brute Ratel C4

Brute Ratel C4 Detected – 18[.]181[.]128[.]244:80

May 15, 2025
hkcert
  • HKCERT
  • News

Google Chrome Multiple Vulnerabilities

May 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel