Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
International_cyber_security_leaders_to_appear_at_flagship_UK_conference
  • NCSC
  • News

International cyber security leaders to appear at flagship UK conference

June 9, 2022

International cyber security leaders to appear at flagship UK conference Top U.S. security officials among the guest speakers at CYBERUK...

Read MoreRead more about International cyber security leaders to appear at flagship UK conference
UK_joins_international_partners_to_issue_advice_on_latest_Russian_cyber_threat
  • NCSC
  • News

UK joins international partners to issue advice on latest Russian cyber threat

June 9, 2022

UK joins international partners to issue advice on latest Russian cyber threat The UK has today joined international partners to...

Read MoreRead more about UK joins international partners to issue advice on latest Russian cyber threat
UK_joins_international_cyber_agency_partners_to_release_supply_chain_guidance
  • NCSC
  • News

UK joins international cyber agency partners to release supply chain guidance

June 9, 2022

UK joins international cyber agency partners to release supply chain guidance Joint advisory sets out practical steps service providers and...

Read MoreRead more about UK joins international cyber agency partners to release supply chain guidance
New_email_security_tool_launched_to_help_organisations_check_their_defences
  • NCSC
  • News

New email security tool launched to help organisations check their defences

June 9, 2022

New email security tool launched to help organisations check their defences New email security checker tool officially launched at CYBERUK...

Read MoreRead more about New email security tool launched to help organisations check their defences
Organisations_offered_streamlined_guidance_to_help_them_move_to_the_cloud
  • NCSC
  • News

Organisations offered streamlined guidance to help them move to the cloud

June 9, 2022

Organisations offered streamlined guidance to help them move to the cloud Flagship Cloud Security Guidance refreshed to support increasing uptake...

Read MoreRead more about Organisations offered streamlined guidance to help them move to the cloud
Russia_behind_cyber_attack_with_Europe-wide_impact_an_hour_before_Ukraine_invasion
  • NCSC
  • News

Russia behind cyber attack with Europe-wide impact an hour before Ukraine invasion

June 9, 2022

Russia behind cyber attack with Europe-wide impact an hour before Ukraine invasion Russia has been behind a series of cyber...

Read MoreRead more about Russia behind cyber attack with Europe-wide impact an hour before Ukraine invasion
NCSC_joins_industry_to_offer_unprecedented_protection_for_public_from_scams
  • NCSC
  • News

NCSC joins industry to offer unprecedented protection for public from scams

June 9, 2022

NCSC joins industry to offer unprecedented protection for public from scams National Cyber Security Centre develops capability with industry partners...

Read MoreRead more about NCSC joins industry to offer unprecedented protection for public from scams
osint
  • Tools

Blackbird – An OSINT Tool To Search For Accounts By Username In 101 Social Networks

June 9, 2022

Blackbird An Setup Clone the repository git clone https://github.com/p1ngul1n0/blackbirdcd blackbird Install requirements pip install -r requirements.txt Usage Search by username...

Read MoreRead more about Blackbird – An OSINT Tool To Search For Accounts By Username In 101 Social Networks
osint
  • News

Symbiote, a nearly-impossible-to-detect Linux malware

June 9, 2022

Researchers uncovered a high stealth Linux malware, dubbed Symbiote, that could be used to backdoor infected systems. Joint research conducted by...

Read MoreRead more about Symbiote, a nearly-impossible-to-detect Linux malware
osint
  • News

Cloud data breaches: 4 biggest threats to cloud storage security

June 9, 2022

Just about anywhere you look, organizations are using the cloud in some form—and they’re not all large enterprises. Small and...

Read MoreRead more about Cloud data breaches: 4 biggest threats to cloud storage security
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: matchbymaslahhunter

June 9, 2022
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: integer-overflows-in-unescape_word()byddme

June 9, 2022
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: moderator-can-enable-cam/mic-remotely-if–cam/mic-permission-was-disabled-while-user-has-activated-cam/micbymichag86

June 9, 2022
osint
  • News

Previously undocumented Aoqin Dragon APT targets entities in Southeast Asia and Australia

June 9, 2022

Researchers spotted a previously undocumented Chinese-speaking APT, tracked as Aoqin Dragon, targeting entities in Southeast Asia and Australia. SentinelOne documented a...

Read MoreRead more about Previously undocumented Aoqin Dragon APT targets entities in Southeast Asia and Australia
windows-malware-detections-business-and-consumer-2019-2021
  • News

ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat

June 9, 2022

Earlier this year Malwarebytes released its 2022 Threat Review, a review of the most important threats and cybersecurity trends of...

Read MoreRead more about ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
osint
  • News

Facebook users targeted in massive phishing campaign

June 9, 2022

Facebook is once again the launchpad for a large-scale phishing campaign, according to researchers at PIXM. The campaign, which first...

Read MoreRead more about Facebook users targeted in massive phishing campaign
bbasta-linux-ransom-note
  • News

BlackBasta is the latest ransomware to target ESXi virtual machines on Linux

June 9, 2022

BlackBasta, an alleged subdivision of the ransomware group Conti, just began supporting the encryption of VMware’s ESXi virtual machines (VM)...

Read MoreRead more about BlackBasta is the latest ransomware to target ESXi virtual machines on Linux
osint
  • Tools

Offensive-Azure – Collection Of Offensive Tools Targeting Microsoft Azure

June 9, 2022

Collection of offensive tools targeting Microsoft Azure written in Python to be platform agnostic. The current list of tools can...

Read MoreRead more about Offensive-Azure – Collection Of Offensive Tools Targeting Microsoft Azure
osint
  • News

Update now! Patch against vulnerabilities in Meeting Owl Pro and Whiteboard Owl devices

June 9, 2022

After a decent amount of pressure, Owl Labs has finally released updates for vulnerabilities in Meeting Owl, and Whiteboard Owl...

Read MoreRead more about Update now! Patch against vulnerabilities in Meeting Owl Pro and Whiteboard Owl devices
osint
  • News

Apple’s passkeys attempt to solve the password problem

June 9, 2022

The recent Apple Worldwide Developers Conference (WWDC) revealed another teasing of what has been referred to as “the end of...

Read MoreRead more about Apple’s passkeys attempt to solve the password problem
Basta
  • Data Breach
  • Ransomware

Black Basta Ransomware Victim: The O’Regan

June 9, 2022

Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about Black Basta Ransomware Victim: The O’Regan
1f447-1
  • News

New Emotet variant uses a module to steal data from Google Chrome

June 9, 2022

Researchers spotted a new variant of the Emotet bot that uses a new module to steal credit card information stored...

Read MoreRead more about New Emotet variant uses a module to steal data from Google Chrome
Basta
  • Data Breach
  • Ransomware

Black Basta Ransomware Victim: Blairex Laboratories, Inc[.]

June 9, 2022

Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about Black Basta Ransomware Victim: Blairex Laboratories, Inc[.]
Basta
  • Data Breach
  • Ransomware

Black Basta Ransomware Victim: Love, Barnes & McKew Insurance Adjusters

June 9, 2022

Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about Black Basta Ransomware Victim: Love, Barnes & McKew Insurance Adjusters

Posts pagination

Previous 1 … 3,174 3,175 3,176 3,177 3,178 3,179 3,180 … 4,087 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

134577a532b0541acf72773f8cbcb1ad326d467b27a5a1778bde066e77c830bc
  • News

Darpa Zaps Popcorn With Laser Power Beamed 5.3 Miles Through Air

May 21, 2025
cd1b1e81757a0d3bb4bebd71e38105ad4dc3123e3f47b53ee35d44dbb3f6193d
  • News

Torvalds’ Typing Taste Test Touches Tactile Tragedy

May 21, 2025
720b1ed7db8ac8dfbfe440012fedf19f002360ded34806158ac4c3fa48720f77
  • News

European Customers Report Oracle Cloud Identity Outage, Big Red Is Silent

May 21, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5002

May 21, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4998

May 21, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel