Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 47[.]99[.]72[.]130:80

June 30, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 47[.]99[.]72[.]130:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 1[.]116[.]155[.]6:443

June 30, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 1[.]116[.]155[.]6:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 46[.]101[.]27[.]127:443

June 30, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 46[.]101[.]27[.]127:443
CVE-prog
  • Vulnerabilities

Motorola Solutions ACE1000 default account | CVE-2022-30270

June 30, 2022

NAME Motorola Solutions ACE1000 default account Platforms Affected:Motorola ACE1000Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Motorola Solutions ACE1000 contains default hardcoded credentials. A...

Read MoreRead more about Motorola Solutions ACE1000 default account | CVE-2022-30270
CVE-prog
  • Vulnerabilities

HOME SPOT CUBE2 command execution | CVE-2022-33948

June 30, 2022

NAME HOME SPOT CUBE2 command execution Platforms Affected:KDDI CORPORATION HOME SPOT CUBE2 V101 KDDI HOME SPOT CUBE2 V102Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access...

Read MoreRead more about HOME SPOT CUBE2 command execution | CVE-2022-33948
CVE-prog
  • Vulnerabilities

Advantech iView SQL injection | CVE-2022-2137

June 30, 2022

NAME Advantech iView SQL injection Platforms Affected:Advantech iView 5.7Risk Level:8.8Exploitability:HighConsequences:Data Manipulation DESCRIPTION Advantech iView is vulnerable to SQL injection. A...

Read MoreRead more about Advantech iView SQL injection | CVE-2022-2137
CVE-prog
  • Vulnerabilities

Simple Page Transition plugin for WordPress cross-site scripting |

June 30, 2022

NAME Simple Page Transition plugin for WordPress cross-site scripting Platforms Affected:WordPress Simple Page Transition Plugin for WordPress 1.4.1Risk Level:7.2Exploitability:HighConsequences:Cross-Site Scripting...

Read MoreRead more about Simple Page Transition plugin for WordPress cross-site scripting |
CVE-prog
  • Vulnerabilities

Advantech iView SQL injection | CVE-2022-2143

June 30, 2022

NAME Advantech iView SQL injection Platforms Affected:Advantech iView 5.7Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Advantech iView could allow a remote attacker to...

Read MoreRead more about Advantech iView SQL injection | CVE-2022-2143
CVE-prog
  • Vulnerabilities

Advantech iView SQL injection | CVE-2022-2136

June 30, 2022

NAME Advantech iView SQL injection Platforms Affected:Advantech iView 5.7Risk Level:8.8Exploitability:HighConsequences:Data Manipulation DESCRIPTION Advantech iView is vulnerable to SQL injection. A...

Read MoreRead more about Advantech iView SQL injection | CVE-2022-2136
CVE-prog
  • Vulnerabilities

ILIAS security bypass | CVE-2022-31266

June 30, 2022

NAME ILIAS security bypass Platforms Affected:ILIAS ILIAS 7.10Risk Level:9.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION ILIAS could allow a remote attacker to bypass security...

Read MoreRead more about ILIAS security bypass | CVE-2022-31266
CVE-prog
  • Vulnerabilities

Vim denial of service | CVE-2022-2231

June 30, 2022

NAME Vim denial of service Platforms Affected:Vim Vim 8.2.5164Risk Level:7.8Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION Vim is vulnerable to a...

Read MoreRead more about Vim denial of service | CVE-2022-2231
CVE-prog
  • Vulnerabilities

Advantech iView denial of service | CVE-2022-2138

June 30, 2022

NAME Advantech iView denial of service Platforms Affected:Advantech iView 5.7Risk Level:8.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION Advantech iView is vulnerable to a...

Read MoreRead more about Advantech iView denial of service | CVE-2022-2138
CVE-prog
  • Vulnerabilities

PrestaShop BlockWishList SQL injection | CVE-2022-31101

June 30, 2022

NAME PrestaShop BlockWishList SQL injection Platforms Affected:PrestaShop BlockWishList 2.0.0Risk Level:8.1Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION PrestaShop BlockWishList is vulnerable to SQL injection. A...

Read MoreRead more about PrestaShop BlockWishList SQL injection | CVE-2022-31101
CVE-prog
  • Vulnerabilities

Atlassian Jira Data Center and Server server-side request forgery | CVE-2022-26135

June 30, 2022

NAME Atlassian Jira Data Center and Server server-side request forgery Platforms Affected:Atlassian Jira Software Data Center 8.14.0 Atlassian Jira Software...

Read MoreRead more about Atlassian Jira Data Center and Server server-side request forgery | CVE-2022-26135
CVE-prog
  • Vulnerabilities

Motorola Solutions ACE1000 default account | CVE-2022-30271

June 30, 2022

NAME Motorola Solutions ACE1000 default account Platforms Affected:Motorola ACE1000Risk Level:9.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Motorola Solutions ACE1000 contains default hardcoded SSH private...

Read MoreRead more about Motorola Solutions ACE1000 default account | CVE-2022-30271
CVE-prog
  • Vulnerabilities

Node.js underscore.deep module code execution | CVE-2022-31106

June 30, 2022

NAME Node.js underscore.deep module code execution Platforms Affected:Node.js underscore.deep 0.5.2Risk Level:8.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js underscore.deep module could allow a remote...

Read MoreRead more about Node.js underscore.deep module code execution | CVE-2022-31106
CVE-prog
  • Vulnerabilities

Advantech iView SQL injection | CVE-2022-2142

June 30, 2022

NAME Advantech iView SQL injection Platforms Affected:Advantech iView 5.7Risk Level:8.1Exploitability:HighConsequences:Data Manipulation DESCRIPTION Advantech iView is vulnerable to SQL injection. A...

Read MoreRead more about Advantech iView SQL injection | CVE-2022-2142
osint
  • News

YTStealer info-stealing malware targets YouTube content creators

June 30, 2022

Researchers detailed a new information-stealing malware, dubbed YTStealer, that targets YouTube content creators. Intezer cybersecurity researchers have detailed a new...

Read MoreRead more about YTStealer info-stealing malware targets YouTube content creators
trend-23
  • Vulnerabilities

Daily Vulnerability Trends: Thu Jun 30 2022

June 30, 2022

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-26809Remote Procedure Call Runtime Remote Code Execution Vulnerability. This CVE ID is...

Read MoreRead more about Daily Vulnerability Trends: Thu Jun 30 2022
osint
  • News

How to Present Cloud Risk to the Board

June 29, 2022

Trend Micro Security Researcher, Erin Sindelar, breaks down three popular types of cloud risk assessments to help CISOs and security...

Read MoreRead more about How to Present Cloud Risk to the Board
gallia-tooling-architecture
  • Tools

Gallia – Extendable Pentesting Framework

June 29, 2022

Gallia is an extendable pentesting framework with the focus on the automotive domain. The scope of gallia is conducting penetration...

Read MoreRead more about Gallia – Extendable Pentesting Framework
osint
  • News

Path Traversal flaw in UnRAR utility can allow hacking Zimbra Mail servers

June 29, 2022

Researchers discovered a new flaw in RARlab’s UnRAR utility, tracked CVE-2022-30333, that can allow to remotely hack Zimbra Webmail servers....

Read MoreRead more about Path Traversal flaw in UnRAR utility can allow hacking Zimbra Mail servers
jwt
  • Tools

Jwtear – Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers

June 29, 2022

A modular command-line tool to parse, create and manipulate JSON Web Token(JWT) tokens for security testing purposes. Features Complete modularity....

Read MoreRead more about Jwtear – Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers
2122-2
  • News

Mitre shared 2022 CWE Top 25 most dangerous software weaknesses

June 29, 2022

The MITRE organization published the 2022 CWE Top 25 most dangerous software weaknesses. The MITRE shared the list of the 2022 top...

Read MoreRead more about Mitre shared 2022 CWE Top 25 most dangerous software weaknesses

Posts pagination

Previous 1 … 3,116 3,117 3,118 3,119 3,120 3,121 3,122 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: aplusmachining[.]com

May 17, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: overheadtyler[.]com

May 17, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: prais[.]ro

May 17, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: clarkmechanicalinc[.]com

May 17, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: distribution2[.]com

May 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel