Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Privacy by Design A Practical Guide to Data Protection in a Connected World

August 25, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Alleged Iranian threat actors leak the code of their CodeRAT malware

September 4, 2022

The author of the remote access trojan (RAT) CodeRAT has leaked the source code of its malware on GitHub. The...

Read MoreRead more about Alleged Iranian threat actors leak the code of their CodeRAT malware
trend-2
  • Vulnerabilities

Daily Vulnerability Trends: Sun Sep 04 2022

September 4, 2022

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-28799The TikTok application before 23.7.3 for Android allows account takeover. A crafted...

Read MoreRead more about Daily Vulnerability Trends: Sun Sep 04 2022
osint
  • News

Security Affairs newsletter Round 382

September 3, 2022

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...

Read MoreRead more about Security Affairs newsletter Round 382
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: password-disclosure-in-initial-setup-of-mail-appbyanna_larch

September 3, 2022

Programme HackerOne Nextcloud Nextcloud Submitted by anna_larch anna_larch Report Password disclosure in initial setup of Mail App Full Report A...

Read MoreRead more about HackerOne Bug Bounty Disclosure: password-disclosure-in-initial-setup-of-mail-appbyanna_larch
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: brute-force-protections-don’t-workbynickvergessen

September 3, 2022

Programme HackerOne Nextcloud Nextcloud Submitted by nickvergessen nickvergessen Report Brute force protections don't work Full Report A considerable amount of...

Read MoreRead more about HackerOne Bug Bounty Disclosure: brute-force-protections-don’t-workbynickvergessen
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: federated-share-accepting/declining-is-not-logged-in-audit-logbyrtod

September 3, 2022

Programme HackerOne Nextcloud Nextcloud Submitted by rtod rtod Report Federated share accepting/declining is not logged in audit log Full Report...

Read MoreRead more about HackerOne Bug Bounty Disclosure: federated-share-accepting/declining-is-not-logged-in-audit-logbyrtod
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: unauthenticated-ssrf-in-3rd-party-module-“cerdic/csstidy”byeg42

September 3, 2022

Programme HackerOne Nextcloud Nextcloud Submitted by eg42 eg42 Report Unauthenticated SSRF in 3rd party module "cerdic/csstidy" Full Report A considerable...

Read MoreRead more about HackerOne Bug Bounty Disclosure: unauthenticated-ssrf-in-3rd-party-module-“cerdic/csstidy”byeg42
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: weak/auto-fill-passwordbyharrisoft

September 3, 2022

Programme HackerOne MTN Group MTN Group Submitted by harrisoft harrisoft Report Weak/Auto Fill Password Full Report A considerable amount of...

Read MoreRead more about HackerOne Bug Bounty Disclosure: weak/auto-fill-passwordbyharrisoft
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: path-traversal-vulnerability-in-grafana-8-x-allows-“-local-file-read-“bya-heybati

September 3, 2022

Programme HackerOne MTN Group MTN Group Submitted by a-heybati a-heybati Report path traversal vulnerability in Grafana 8.x allows " local...

Read MoreRead more about HackerOne Bug Bounty Disclosure: path-traversal-vulnerability-in-grafana-8-x-allows-“-local-file-read-“bya-heybati
osint
  • News

Google rolled out emergency fixes to address actively exploited Chrome zero-day

September 3, 2022

Google rolled out emergency fixes to address a vulnerability in the Chrome web browser that is being actively exploited in...

Read MoreRead more about Google rolled out emergency fixes to address actively exploited Chrome zero-day
ApacheTomcatScanner_1_banner
  • Tools

ApacheTomcatScanner – A Python Script To Scan For Apache Tomcat Server Vulnerabilities

September 3, 2022

A python script to scan for Apache Tomcat server vulnerabilities. FeaturesMultithreaded workers to search for Apache tomcat servers.Multiple target source...

Read MoreRead more about ApacheTomcatScanner – A Python Script To Scan For Apache Tomcat Server Vulnerabilities
CVE-prog
  • Vulnerabilities

Apache OFBiz code execution | CVE-2022-25813

September 3, 2022

NAME Apache OFBiz code execution Platforms Affected:Apache OFBiz 18.12.05Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Apache OFBiz could allow a remote attacker to...

Read MoreRead more about Apache OFBiz code execution | CVE-2022-25813
CVE-prog
  • Vulnerabilities

Node.js lit-payment-form module code execution |

September 3, 2022

NAME Node.js lit-payment-form module code execution Platforms Affected:Node.js lit-payment-formRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js lit-payment-form module could allow a remote attacker...

Read MoreRead more about Node.js lit-payment-form module code execution |
CVE-prog
  • Vulnerabilities

Node.js priv-depen module code execution |

September 3, 2022

NAME Node.js priv-depen module code execution Platforms Affected:Node.js priv-depenRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js priv-depen module could allow a remote attacker...

Read MoreRead more about Node.js priv-depen module code execution |
CVE-prog
  • Vulnerabilities

PowerCMS command execution | CVE-2022-33941

September 3, 2022

NAME PowerCMS command execution Platforms Affected:Alfasado PowerCMS 5.19 Alfasado PowerCMS 4.49 Alfasado PowerCMS 3.295Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION PowerCMS could allow...

Read MoreRead more about PowerCMS command execution | CVE-2022-33941
CVE-prog
  • Vulnerabilities

Node.js sketch-pexels module code execution |

September 3, 2022

NAME Node.js sketch-pexels module code execution Platforms Affected:Node.js sketch-pexelsRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js sketch-pexels module could allow a remote attacker...

Read MoreRead more about Node.js sketch-pexels module code execution |
CVE-prog
  • Vulnerabilities

Apache Airflow session hijacking | CVE-2022-38054

September 3, 2022

NAME Apache Airflow session hijacking Platforms Affected:Apache Airflow 2.2.4 Apache Airflow 2.3.3Risk Level:9.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Apache Airflow could allow a...

Read MoreRead more about Apache Airflow session hijacking | CVE-2022-38054
CVE-prog
  • Vulnerabilities

Node.js osds module code execution |

September 3, 2022

NAME Node.js osds module code execution Platforms Affected:Node.js osdsRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js osds module could allow a remote attacker...

Read MoreRead more about Node.js osds module code execution |
CVE-prog
  • Vulnerabilities

Node.js request-slack-invite module code execution |

September 3, 2022

NAME Node.js request-slack-invite module code execution Platforms Affected:Node.js request-slack-inviteRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js request-slack-invite module could allow a remote attacker...

Read MoreRead more about Node.js request-slack-invite module code execution |
CVE-prog
  • Vulnerabilities

Apache OFBiz code execution | CVE-2022-29063

September 3, 2022

NAME Apache OFBiz code execution Platforms Affected:Apache OFBiz 18.12.05Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Apache OFBiz could allow a remote attacker to...

Read MoreRead more about Apache OFBiz code execution | CVE-2022-29063
CVE-prog
  • Vulnerabilities

Node.js pqc.js module code execution |

September 3, 2022

NAME Node.js pqc.js module code execution Platforms Affected:Node.js pqc.jsRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js pqc.js module could allow a remote attacker...

Read MoreRead more about Node.js pqc.js module code execution |
CVE-prog
  • Vulnerabilities

Node.js s3-state-action module code execution |

September 3, 2022

NAME Node.js s3-state-action module code execution Platforms Affected:Node.js s3-state-actionRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js s3-state-action module could allow a remote attacker...

Read MoreRead more about Node.js s3-state-action module code execution |
CVE-prog
  • Vulnerabilities

Node.js nsmalkasm module code execution |

September 3, 2022

NAME Node.js nsmalkasm module code execution Platforms Affected:Node.js nsmalkasmRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js nsmalkasm module could allow a remote attacker...

Read MoreRead more about Node.js nsmalkasm module code execution |
CVE-prog
  • Vulnerabilities

Node.js node-network-listener module code execution |

September 3, 2022

NAME Node.js node-network-listener module code execution Platforms Affected:Node.js node-network-listenerRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js node-network-listener module could allow a remote attacker...

Read MoreRead more about Node.js node-network-listener module code execution |

Posts pagination

Previous 1 … 3,284 3,285 3,286 3,287 3,288 3,289 3,290 … 4,378 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: marlboroughpartners[.]com

August 26, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: hydrometrics[.]com

August 26, 2025
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: Security First Credit Union

August 26, 2025
image
  • Data Breach
  • Ransomware

[DIREWOLF] – Ransomware Victim: 台灣東洋國際儀表股份有限公司

August 26, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: gibbswire[.]com

August 26, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel