Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 81[.]68[.]217[.]105:8080

June 25, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 81[.]68[.]217[.]105:8080
CVE-prog
  • Vulnerabilities

CODESYS Gateway Server V2 denial of service | CVE-2022-31802

June 25, 2022

NAME CODESYS Gateway Server V2 denial of service Platforms Affected:CODESYS Gateway Server V2 2.3.9.37Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION CODESYS Gateway Server...

Read MoreRead more about CODESYS Gateway Server V2 denial of service | CVE-2022-31802
CVE-prog
  • Vulnerabilities

CODESYS products denial of service | CVE-2022-32142

June 25, 2022

NAME CODESYS products denial of service Platforms Affected:CODESYS Runtime Toolkit 32 bit 2.4.7.57 CODESYS PLCWinNT 2.4.7.57Risk Level:8.1Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION...

Read MoreRead more about CODESYS products denial of service | CVE-2022-32142
CVE-prog
  • Vulnerabilities

Secheron SEPCOS security bypass | CVE-2022-2105

June 25, 2022

NAME Secheron SEPCOS security bypass Platforms Affected:Secheron SEPCOS Control and Protection Relay 1.23 Secheron SEPCOS Control and Protection Relay 1.24...

Read MoreRead more about Secheron SEPCOS security bypass | CVE-2022-2105
CVE-prog
  • Vulnerabilities

CODESYS products denial of service | CVE-2022-32138

June 25, 2022

NAME CODESYS products denial of service Platforms Affected:CODESYS Runtime Toolkit 32 bit 2.4.7.57 CODESYS PLCWinNT 2.4.7.57Risk Level:8.8Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION...

Read MoreRead more about CODESYS products denial of service | CVE-2022-32138
CVE-prog
  • Vulnerabilities

Secheron SEPCOS security bypass | CVE-2022-2102

June 25, 2022

NAME Secheron SEPCOS security bypass Platforms Affected:Secheron SEPCOS Control and Protection Relay 1.23 Secheron SEPCOS Control and Protection Relay 1.24...

Read MoreRead more about Secheron SEPCOS security bypass | CVE-2022-2102
CVE-prog
  • Vulnerabilities

Vim code execution | CVE-2022-2175

June 25, 2022

NAME Vim code execution Platforms Affected:Vim Vim 8.2.5150Risk Level:7.8Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION Vim could allow a remote attacker to...

Read MoreRead more about Vim code execution | CVE-2022-2175
CVE-prog
  • Vulnerabilities

Microsoft Edge (Chromium-based) privilege escalation | CVE-2022-33638

June 25, 2022

NAME Microsoft Edge (Chromium-based) privilege escalation Platforms Affected:Microsoft Edge (Chromium-based)Risk Level:8.3Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION Microsoft Edge (Chromium-based) could allow a remote...

Read MoreRead more about Microsoft Edge (Chromium-based) privilege escalation | CVE-2022-33638
CVE-prog
  • Vulnerabilities

Microsoft Edge (Chromium-based) privilege escalation | CVE-2022-30192

June 25, 2022

NAME Microsoft Edge (Chromium-based) privilege escalation Platforms Affected:Microsoft Edge (Chromium-based)Risk Level:8.3Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION Microsoft Edge (Chromium-based) could allow a remote...

Read MoreRead more about Microsoft Edge (Chromium-based) privilege escalation | CVE-2022-30192
CVE-prog
  • Vulnerabilities

Secheron SEPCOS security bypass | CVE-2022-2104

June 25, 2022

NAME Secheron SEPCOS security bypass Platforms Affected:Secheron SEPCOS Control and Protection Relay 1.23 Secheron SEPCOS Control and Protection Relay 1.24...

Read MoreRead more about Secheron SEPCOS security bypass | CVE-2022-2104
CVE-prog
  • Vulnerabilities

CODESYS products man-in-the-middle | CVE-2022-31805

June 25, 2022

NAME CODESYS products man-in-the-middle Platforms Affected:CODESYS Development System 2.3.9.68 CODESYS Gateway Client 2.3.9.68 CODESYS Gateway Server 2.3.9.68 CODESYS Web server...

Read MoreRead more about CODESYS products man-in-the-middle | CVE-2022-31805
CVE-prog
  • Vulnerabilities

Secheron SEPCOS security bypass | CVE-2022-2103

June 25, 2022

NAME Secheron SEPCOS security bypass Platforms Affected:Secheron SEPCOS Control and Protection Relay 1.23 Secheron SEPCOS Control and Protection Relay 1.24...

Read MoreRead more about Secheron SEPCOS security bypass | CVE-2022-2103
CVE-prog
  • Vulnerabilities

CODESYS products unauthorized access | CVE-2022-32143

June 25, 2022

NAME CODESYS products unauthorized access Platforms Affected:CODESYS Runtime Toolkit 32 bit 2.4.7.57 CODESYS PLCWinNT 2.4.7.57Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION CODESYS products...

Read MoreRead more about CODESYS products unauthorized access | CVE-2022-32143
CVE-prog
  • Vulnerabilities

SMA Technologies OpCon UNIX agent security bypass | US-CERT VU#142546

June 25, 2022

NAME SMA Technologies OpCon UNIX agent security bypass Platforms Affected:SMA Technologies OpCon UNIX agentRisk Level:9.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION SMA Technologies OpCon...

Read MoreRead more about SMA Technologies OpCon UNIX agent security bypass | US-CERT VU#142546
CVE-prog
  • Vulnerabilities

CODESYS products weak security | CVE-2022-31806

June 25, 2022

NAME CODESYS products weak security Platforms Affected:CODESYS Development System 2.3.9.68 CODESYS Gateway Client 2.3.9.68 CODESYS Gateway Server 2.3.9.68 CODESYS Web...

Read MoreRead more about CODESYS products weak security | CVE-2022-31806
CVE-prog
  • Vulnerabilities

Vim code execution | CVE-2022-2183

June 25, 2022

NAME Vim code execution Platforms Affected:Vim Vim 8.2.5150Risk Level:7.8Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION Vim could allow a remote attacker to...

Read MoreRead more about Vim code execution | CVE-2022-2183
CVE-prog
  • Vulnerabilities

Pyramid EtherNet/IP Adapter Development Kit denial of service | CVE-2022-1737

June 25, 2022

NAME Pyramid EtherNet/IP Adapter Development Kit denial of service Platforms Affected:Pyramid Solutions EtherNet/IP Adapter Development Kit 4.4 Pyramid Solutions EtherNet/IP...

Read MoreRead more about Pyramid EtherNet/IP Adapter Development Kit denial of service | CVE-2022-1737
CVE-prog
  • Vulnerabilities

Vim buffer overflow | CVE-2022-2182

June 25, 2022

NAME Vim buffer overflow Platforms Affected:Vim Vim 8.2.5150Risk Level:7.8Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION Vim is vulnerable to a heap-based buffer...

Read MoreRead more about Vim buffer overflow | CVE-2022-2182
CVE-prog
  • Vulnerabilities

openlibrary cross-site scripting | CVE-2022-23081

June 25, 2022

NAME openlibrary cross-site scripting Platforms Affected:openlibrary openlibrary deploy-2021-12-22 openlibrary openlibrary deploy-2016-07-0Risk Level:8.1Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION openlibrary is vulnerable to cross-site scripting,...

Read MoreRead more about openlibrary cross-site scripting | CVE-2022-23081
CVE-prog
  • Vulnerabilities

IBM CICS TX command execution | CVE-2022-31767

June 25, 2022

NAME IBM CICS TX command execution Platforms Affected:IBM CICS TX Standard 11.1 IBM CICS TX Advanced 11.1Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION...

Read MoreRead more about IBM CICS TX command execution | CVE-2022-31767
CVE-prog
  • Vulnerabilities

SiHAS SGW-300, ACM-300, GCM-300 security bypass | CVE-2021-26637

June 25, 2022

NAME SiHAS SGW-300, ACM-300, GCM-300 security bypass Platforms Affected:Sihas SGW-300 Sihas ACM-300 Sihas GCM-300Risk Level:8.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION SiHAS SGW-300, ACM-300,...

Read MoreRead more about SiHAS SGW-300, ACM-300, GCM-300 security bypass | CVE-2021-26637
CVE-prog
  • Vulnerabilities

Secheron SEPCOS default account | CVE-2022-1668

June 25, 2022

NAME Secheron SEPCOS default account Platforms Affected:Secheron SEPCOS Control and Protection Relay 1.23 Secheron SEPCOS Control and Protection Relay 1.24...

Read MoreRead more about Secheron SEPCOS default account | CVE-2022-1668
CVE-prog
  • Vulnerabilities

Elcomplus SmartICS cross-site scripting | CVE-2022-2140

June 25, 2022

NAME Elcomplus SmartICS cross-site scripting Platforms Affected:Elcomplus SmartICS 2.3.4.0Risk Level:8.8Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION Elcomplus SmartICS is vulnerable to cross-site scripting, caused...

Read MoreRead more about Elcomplus SmartICS cross-site scripting | CVE-2022-2140
CVE-prog
  • Vulnerabilities

CODESYS products buffer overflow | CVE-2022-32137

June 25, 2022

NAME CODESYS products buffer overflow Platforms Affected:CODESYS Runtime Toolkit 32 bit 2.4.7.57 CODESYS PLCWinNT 2.4.7.57Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION CODESYS products...

Read MoreRead more about CODESYS products buffer overflow | CVE-2022-32137

Posts pagination

Previous 1 … 3,134 3,135 3,136 3,137 3,138 3,139 3,140 … 4,087 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

134577a532b0541acf72773f8cbcb1ad326d467b27a5a1778bde066e77c830bc
  • News

Darpa Zaps Popcorn With Laser Power Beamed 5.3 Miles Through Air

May 21, 2025
cd1b1e81757a0d3bb4bebd71e38105ad4dc3123e3f47b53ee35d44dbb3f6193d
  • News

Torvalds’ Typing Taste Test Touches Tactile Tragedy

May 21, 2025
720b1ed7db8ac8dfbfe440012fedf19f002360ded34806158ac4c3fa48720f77
  • News

European Customers Report Oracle Cloud Identity Outage, Big Red Is Silent

May 21, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5002

May 21, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4998

May 21, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel