Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 162[.]241[.]127[.]30:80

April 15, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 162[.]241[.]127[.]30:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 8[.]135[.]96[.]164:80

April 15, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 8[.]135[.]96[.]164:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 123[.]206[.]47[.]78:80

April 15, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 123[.]206[.]47[.]78:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 47[.]103[.]157[.]82:8000

April 15, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 47[.]103[.]157[.]82:8000
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 13[.]40[.]228[.]173:80

April 15, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 13[.]40[.]228[.]173:80
osint
  • News

Ways to Develop a Cybersecurity Training Program for Employees

April 15, 2022

Cybersecurity experts would have you believe that your organization’s employees have a crucial role in bolstering or damaging your company’s...

Read MoreRead more about Ways to Develop a Cybersecurity Training Program for Employees
CVE-prog
  • Vulnerabilities

Microsoft Windows Kerberos code execution | CVE-2022-24545

April 15, 2022

NAME Microsoft Windows Kerberos code execution Platforms Affected:Microsoft Windows Server 2016 Microsoft Windows Server 2019 Microsoft Windows 10 1809 for...

Read MoreRead more about Microsoft Windows Kerberos code execution | CVE-2022-24545
CVE-prog
  • Vulnerabilities

MinIO privilege escalation | CVE-2022-24842

April 15, 2022

NAME MinIO privilege escalation Platforms Affected:MinIO MinIO RELEASE.2021-12-09T06-19-41ZRisk Level:8.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION MinIO could allow a remote authenticated attacker to gain...

Read MoreRead more about MinIO privilege escalation | CVE-2022-24842
CVE-prog
  • Vulnerabilities

Jenkins Extended Choice Parameter Plugin cross-site scripting | CVE-2022-29038

April 15, 2022

NAME Jenkins Extended Choice Parameter Plugin cross-site scripting Platforms Affected:Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86cRisk Level:8Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION Jenkins Extended...

Read MoreRead more about Jenkins Extended Choice Parameter Plugin cross-site scripting | CVE-2022-29038
CVE-prog
  • Vulnerabilities

Citrix XenMobile Server code execution | CVE-2022-26151

April 15, 2022

NAME Citrix XenMobile Server code execution Platforms Affected:Citrix XenMobile Server 10.13.0 Citrix XenMobile Server 10.14.0Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Citrix XenMobile...

Read MoreRead more about Citrix XenMobile Server code execution | CVE-2022-26151
CVE-prog
  • Vulnerabilities

Aethon TUG Home Base Server information disclosure | CVE-2022-26423

April 15, 2022

NAME Aethon TUG Home Base Server information disclosure Platforms Affected:Aethon TUG Home Base Server 23 Aethon TUG Home Base Server...

Read MoreRead more about Aethon TUG Home Base Server information disclosure | CVE-2022-26423
CVE-prog
  • Vulnerabilities

Johnson Controls Metasys information disclosure | CVE-2021-36205

April 15, 2022

NAME Johnson Controls Metasys information disclosure Platforms Affected:Johnson Controls Metasys 10 Johnson Controls Metasys 11Risk Level:8.1Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION Johnson Controls...

Read MoreRead more about Johnson Controls Metasys information disclosure | CVE-2021-36205
CVE-prog
  • Vulnerabilities

Delta Controls enteliTOUCH cross-site scripting |

April 15, 2022

NAME Delta Controls enteliTOUCH cross-site scripting Platforms Affected:Delta Controls enteliTOUCH 3.40.3935 Delta Controls enteliTOUCH 3.40.3706 Delta Controls enteliTOUCH 3.33.4005Risk Level:7.2Exploitability:HighConsequences:Cross-Site...

Read MoreRead more about Delta Controls enteliTOUCH cross-site scripting |
CVE-prog
  • Vulnerabilities

Cisco IOS XE Software denial of service | CVE-2022-20678

April 15, 2022

NAME Cisco IOS XE Software denial of service Platforms Affected:Cisco IOS XE Software Cisco Cloud Services Router 1000V Series Cisco...

Read MoreRead more about Cisco IOS XE Software denial of service | CVE-2022-20678
CVE-prog
  • Vulnerabilities

Vyper integer overflow | CVE-2022-24845

April 15, 2022

NAME Vyper integer overflow Platforms Affected:Vyper Vyper 0.3.1Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Vyper could allow a remote attacker to execute arbitrary...

Read MoreRead more about Vyper integer overflow | CVE-2022-24845
CVE-prog
  • Vulnerabilities

Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family denial of service | CVE-2022-20682

April 15, 2022

NAME Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family denial of service Platforms Affected:Cisco Catalyst 9800 Series...

Read MoreRead more about Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family denial of service | CVE-2022-20682
CVE-prog
  • Vulnerabilities

Microsoft Windows Hyper-V Shared Virtual Hard Disks information disclosure | CVE-2022-24539

April 15, 2022

NAME Microsoft Windows Hyper-V Shared Virtual Hard Disks information disclosure Platforms Affected:Microsoft Windows Server 2016 Microsoft Windows Server 2019 Microsoft...

Read MoreRead more about Microsoft Windows Hyper-V Shared Virtual Hard Disks information disclosure | CVE-2022-24539
CVE-prog
  • Vulnerabilities

Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers denial of service | CVE-2022-20683

April 15, 2022

NAME Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers denial of service Platforms Affected:Cisco Catalyst 9800 Series...

Read MoreRead more about Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers denial of service | CVE-2022-20683
CVE-prog
  • Vulnerabilities

Jenkins Jira Plugin cross-site scripting | CVE-2022-29041

April 15, 2022

NAME Jenkins Jira Plugin cross-site scripting Platforms Affected:Jenkins Jira Plugin 3.7Risk Level:8Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION Jenkins Jira Plugin is vulnerable to...

Read MoreRead more about Jenkins Jira Plugin cross-site scripting | CVE-2022-29041
CVE-prog
  • Vulnerabilities

FLIPPED-AURORA Gin-vue-admin SQL injection | CVE-2022-24844

April 15, 2022

NAME FLIPPED-AURORA Gin-vue-admin SQL injection Platforms Affected:FLIPPED-AURORA Gin-vue-admin 2.5.0Risk Level:8.1Exploitability:HighConsequences:Data Manipulation DESCRIPTION FLIPPED-AURORA Gin-vue-admin is vulnerable to SQL injection. A...

Read MoreRead more about FLIPPED-AURORA Gin-vue-admin SQL injection | CVE-2022-24844
CVE-prog
  • Vulnerabilities

McAfee ePolicy Orchestrator extension for McAfee Agent SQL injection | CVE-2022-1258

April 15, 2022

NAME McAfee ePolicy Orchestrator extension for McAfee Agent SQL injection Platforms Affected:McAfee ePO Extension for McAfee Agent 4.0 McAfee ePO...

Read MoreRead more about McAfee ePolicy Orchestrator extension for McAfee Agent SQL injection | CVE-2022-1258
CVE-prog
  • Vulnerabilities

Microsoft Visual Studio code execution | CVE-2022-24765

April 15, 2022

NAME Microsoft Visual Studio code execution Platforms Affected:Microsoft Visual Studio 2019 16.0 Microsoft Visual Studio 2019 16.1 Microsoft Visual Studio...

Read MoreRead more about Microsoft Visual Studio code execution | CVE-2022-24765
CVE-prog
  • Vulnerabilities

Aethon TUG Home Base Server security bypass | CVE-2022-1066

April 15, 2022

NAME Aethon TUG Home Base Server security bypass Platforms Affected:Aethon TUG Home Base Server 23 Aethon TUG Home Base Server...

Read MoreRead more about Aethon TUG Home Base Server security bypass | CVE-2022-1066
CVE-prog
  • Vulnerabilities

Jenkins Git Parameter Plugin cross-site scripting | CVE-2022-29040

April 15, 2022

NAME Jenkins Git Parameter Plugin cross-site scripting Platforms Affected:Jenkins Git Parameter Plugin 0.9.15Risk Level:8Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION Jenkins Git Parameter Plugin...

Read MoreRead more about Jenkins Git Parameter Plugin cross-site scripting | CVE-2022-29040

Posts pagination

Previous 1 … 3,389 3,390 3,391 3,392 3,393 3,394 3,395 … 4,174 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-6498

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6497

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6496

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6500

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-52926

June 25, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel