Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025
unlock_membership
  • Premium Members Content

Fortifying the Supply Chain through Practical Security for Modern Organizations

September 22, 2025
unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Data Breach
  • Ransomware

[BLACKLOCK] – Ransomware Victim: MCM Construction

May 30, 2025

Ransomware Group: BLACKLOCK VICTIM NAME: MCM Construction NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [BLACKLOCK] – Ransomware Victim: MCM Construction
image
  • Vulnerabilities

CVE Alert: CVE-2023-41591

May 30, 2025

Vulnerability Summary: CVE-2023-41591 An issue in Open Network Foundation ONOS v2.7.0 allows attackers to create fake IP/MAC addresses and potentially...

Read MoreRead more about CVE Alert: CVE-2023-41591
image
  • Vulnerabilities

CVE Alert: CVE-2025-5324

May 30, 2025

Vulnerability Summary: CVE-2025-5324 A vulnerability, which was classified as problematic, was found in TechPowerUp GPU-Z 2.23.0. Affected is the function...

Read MoreRead more about CVE Alert: CVE-2025-5324
image
  • Vulnerabilities

CVE Alert: CVE-2025-48336

May 30, 2025

Vulnerability Summary: CVE-2025-48336 Deserialization of Untrusted Data vulnerability in ThimPress Course Builder allows Object Injection.This issue affects Course Builder: from...

Read MoreRead more about CVE Alert: CVE-2025-48336
image
  • Vulnerabilities

CVE Alert: CVE-2025-32752

May 30, 2025

Vulnerability Summary: CVE-2025-32752 Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker...

Read MoreRead more about CVE Alert: CVE-2025-32752
image
  • Vulnerabilities

CVE Alert: CVE-2025-5323

May 30, 2025

Vulnerability Summary: CVE-2025-5323 A vulnerability, which was classified as problematic, has been found in fossasia open-event-server 1.19.1. This issue affects...

Read MoreRead more about CVE Alert: CVE-2025-5323
image
  • Vulnerabilities

CVE Alert: CVE-2025-2518

May 30, 2025

Vulnerability Summary: CVE-2025-2518 IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through...

Read MoreRead more about CVE Alert: CVE-2025-2518
image
  • Vulnerabilities

CVE Alert: CVE-2025-3050

May 30, 2025

Vulnerability Summary: CVE-2025-3050 IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through...

Read MoreRead more about CVE Alert: CVE-2025-3050
image
  • Vulnerabilities

CVE Alert: CVE-2024-49350

May 30, 2025

Vulnerability Summary: CVE-2024-49350 IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9...

Read MoreRead more about CVE Alert: CVE-2024-49350
image
  • Vulnerabilities

CVE Alert: CVE-2024-54952

May 30, 2025

Vulnerability Summary: CVE-2024-54952 MikroTik RouterOS 6.40.5, the SMB service contains a memory corruption vulnerability. Remote, unauthenticated attackers can exploit this...

Read MoreRead more about CVE Alert: CVE-2024-54952
image
  • Vulnerabilities

CVE Alert: CVE-2025-5325

May 30, 2025

Vulnerability Summary: CVE-2025-5325 A vulnerability has been found in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0 and classified as...

Read MoreRead more about CVE Alert: CVE-2025-5325
image
  • Vulnerabilities

CVE Alert: CVE-2025-5326

May 30, 2025

Vulnerability Summary: CVE-2025-5326 A vulnerability was found in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0 and classified as critical....

Read MoreRead more about CVE Alert: CVE-2025-5326
image
  • Vulnerabilities

CVE Alert: CVE-2025-47288

May 30, 2025

Vulnerability Summary: CVE-2025-47288 Discourse Policy plugin gives the ability to confirm users have seen or done something. Prior to version...

Read MoreRead more about CVE Alert: CVE-2025-47288
image
  • Vulnerabilities

CVE Alert: CVE-2025-47933

May 30, 2025

Vulnerability Summary: CVE-2025-47933 Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.13.8, 2.14.13, and...

Read MoreRead more about CVE Alert: CVE-2025-47933
image
  • Vulnerabilities

CVE Alert: CVE-2025-4967

May 30, 2025

Vulnerability Summary: CVE-2025-4967 Esri Portal for ArcGIS 11.4 and prior allows a remote, unauthenticated attacker to bypass the Portal’s SSRF...

Read MoreRead more about CVE Alert: CVE-2025-4967
image
  • Vulnerabilities

CVE Alert: CVE-2025-5328

May 30, 2025

Vulnerability Summary: CVE-2025-5328 A vulnerability was found in chshcms mccms 2.7. It has been declared as critical. This vulnerability affects...

Read MoreRead more about CVE Alert: CVE-2025-5328
image
  • Vulnerabilities

CVE Alert: CVE-2025-5332

May 30, 2025

Vulnerability Summary: CVE-2025-5332 A vulnerability was found in 1000 Projects Online Notice Board 1.0 and classified as critical. This issue...

Read MoreRead more about CVE Alert: CVE-2025-5332
image
  • Vulnerabilities

CVE Alert: CVE-2025-5327

May 30, 2025

Vulnerability Summary: CVE-2025-5327 A vulnerability was found in chshcms mccms 2.7. It has been classified as critical. This affects the...

Read MoreRead more about CVE Alert: CVE-2025-5327
image
  • Vulnerabilities

CVE Alert: CVE-2025-5330

May 30, 2025

Vulnerability Summary: CVE-2025-5330 A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. This affects an...

Read MoreRead more about CVE Alert: CVE-2025-5330
image
  • Vulnerabilities

CVE Alert: CVE-2025-5331

May 30, 2025

Vulnerability Summary: CVE-2025-5331 A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. This vulnerability affects...

Read MoreRead more about CVE Alert: CVE-2025-5331
image
  • Vulnerabilities

CVE Alert: CVE-2025-5307

May 30, 2025

Vulnerability Summary: CVE-2025-5307 Santesoft Sante DICOM Viewer Pro contains a memory corruption vulnerability. A local attacker could exploit this issue...

Read MoreRead more about CVE Alert: CVE-2025-5307
f4e1a08725c69176e312b9a8497ad44af4c8cb56b10efb147bafc5306a569694
  • News

Russian It Pro Sentenced To 14 Years Forced Labor For Sharing Medical Data Withukraine

May 30, 2025

A Russian programmer will face the next 14 years in a "strict-regime" (high-security) penal colony after a regional court ruled...

Read MoreRead more about Russian It Pro Sentenced To 14 Years Forced Labor For Sharing Medical Data Withukraine
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025

In today’s digital landscape, safeguarding your systems is more critical than ever. Security assessment and testing are essential processes that...

Read MoreRead more about Mastering Security Assessment and Testing for a Robust Defense
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: Jordan Drug

May 30, 2025

Ransomware Group: INCRANSOM VICTIM NAME: Jordan Drug NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [INCRANSOM] – Ransomware Victim: Jordan Drug

Posts pagination

Previous 1 … 313 314 315 316 317 318 319 … 4,430 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-9561 – hovanesvn – AP Background

October 3, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9212 – ekndev – WP Dispatcher

October 3, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9213 – textbuilder – TextBuilder

October 3, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-11234 – Red Hat – Red Hat Enterprise Linux 10

October 3, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9200 – nebelhorn – Blappsta Mobile App Plugin – Your native, mobile iPhone App and Android App

October 3, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel