Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials: A Practical Roadmap for Modern Infrastructures

August 11, 2025
unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Coru LFMember plugin for WordPress cross-site scripting |

April 28, 2022

NAME Coru LFMember plugin for WordPress cross-site scripting Platforms Affected:WordPress Coru LFMember plugin for WordPress 1.0.2Risk Level:7.2Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION Coru...

Read MoreRead more about Coru LFMember plugin for WordPress cross-site scripting |
CVE-prog
  • Vulnerabilities

WP-Invoice plugin for WordPress WP-Invoice settings cross-site scripting |

April 28, 2022

NAME WP-Invoice plugin for WordPress WP-Invoice settings cross-site scripting Platforms Affected:WordPress WP-Invoice plugin for WordPress 4.3.1Risk Level:7.2Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION WP-Invoice...

Read MoreRead more about WP-Invoice plugin for WordPress WP-Invoice settings cross-site scripting |
CVE-prog
  • Vulnerabilities

Google Chrome Vulkan code execution | CVE-2022-1477

April 28, 2022

NAME Google Chrome Vulkan code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote attacker...

Read MoreRead more about Google Chrome Vulkan code execution | CVE-2022-1477
CVE-prog
  • Vulnerabilities

Google Chrome Device API code execution | CVE-2022-1480

April 28, 2022

NAME Google Chrome Device API code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote...

Read MoreRead more about Google Chrome Device API code execution | CVE-2022-1480
CVE-prog
  • Vulnerabilities

Google Chrome Browser Switcher code execution | CVE-2022-1490

April 28, 2022

NAME Google Chrome Browser Switcher code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote...

Read MoreRead more about Google Chrome Browser Switcher code execution | CVE-2022-1490
CVE-prog
  • Vulnerabilities

Cisco Adaptive Security Appliance Software denial of service | CVE-2022-20760

April 28, 2022

NAME Cisco Adaptive Security Appliance Software denial of service Platforms Affected:Cisco Adaptive Security Appliance Software 8.2(1) Cisco Adaptive Security Appliance...

Read MoreRead more about Cisco Adaptive Security Appliance Software denial of service | CVE-2022-20760
CVE-prog
  • Vulnerabilities

Google Chrome Web UI Settings buffer overflow | CVE-2022-1484

April 28, 2022

NAME Google Chrome Web UI Settings buffer overflow Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome is vulnerable to...

Read MoreRead more about Google Chrome Web UI Settings buffer overflow | CVE-2022-1484
CVE-prog
  • Vulnerabilities

Cisco Firepower Threat Defense Software denial of service | CVE-2022-20767

April 28, 2022

NAME Cisco Firepower Threat Defense Software denial of service Platforms Affected:Cisco Firepower Threat Defense (FTD) Software 6.2.0 Cisco Firepower Threat...

Read MoreRead more about Cisco Firepower Threat Defense Software denial of service | CVE-2022-20767
CVE-prog
  • Vulnerabilities

Google Chrome File Manager code execution | CVE-2022-1496

April 28, 2022

NAME Google Chrome File Manager code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote...

Read MoreRead more about Google Chrome File Manager code execution | CVE-2022-1496
CVE-prog
  • Vulnerabilities

Cisco Firepower Threat Defense Software denial of service | CVE-2022-20746

April 28, 2022

NAME Cisco Firepower Threat Defense Software denial of service Platforms Affected:Cisco Firepower Threat Defense Software 7.0.0Risk Level:8.6Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION...

Read MoreRead more about Cisco Firepower Threat Defense Software denial of service | CVE-2022-20746
CVE-prog
  • Vulnerabilities

Cisco Firepower Threat Defense Software denial of service | CVE-2022-20757

April 28, 2022

NAME Cisco Firepower Threat Defense Software denial of service Platforms Affected:Cisco Firepower Threat Defense Software 7.0.0Risk Level:8.6Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION...

Read MoreRead more about Cisco Firepower Threat Defense Software denial of service | CVE-2022-20757
CVE-prog
  • Vulnerabilities

Google Chrome SwiftShader code execution | CVE-2022-1478

April 28, 2022

NAME Google Chrome SwiftShader code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote attacker...

Read MoreRead more about Google Chrome SwiftShader code execution | CVE-2022-1478
CVE-prog
  • Vulnerabilities

Google Chrome UI Shelf code execution | CVE-2022-1489

April 28, 2022

NAME Google Chrome UI Shelf code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote...

Read MoreRead more about Google Chrome UI Shelf code execution | CVE-2022-1489
CVE-prog
  • Vulnerabilities

Google Chrome Ozone code execution | CVE-2022-1487

April 28, 2022

NAME Google Chrome Ozone code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote attacker...

Read MoreRead more about Google Chrome Ozone code execution | CVE-2022-1487
CVE-prog
  • Vulnerabilities

Google Chrome Bookmarks code execution | CVE-2022-1491

April 28, 2022

NAME Google Chrome Bookmarks code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote attacker...

Read MoreRead more about Google Chrome Bookmarks code execution | CVE-2022-1491
CVE-prog
  • Vulnerabilities

Apache CouchDB privilege escalation | CVE-2022-24706

April 28, 2022

NAME Apache CouchDB privilege escalation Platforms Affected:Apache CouchDB 3.2.1Risk Level:9.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION Apache CouchDB could allow a remote attacker to...

Read MoreRead more about Apache CouchDB privilege escalation | CVE-2022-24706
CVE-prog
  • Vulnerabilities

Node.js bigid-filter-recursive-parser module code execution |

April 28, 2022

NAME Node.js bigid-filter-recursive-parser module code execution Platforms Affected:Node.js bigid-filter-recursive-parserRisk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js bigid-filter-recursive-parser module could allow a remote attacker...

Read MoreRead more about Node.js bigid-filter-recursive-parser module code execution |
CVE-prog
  • Vulnerabilities

Cisco Firepower Threat Defense Software denial of service | CVE-2022-20751

April 28, 2022

NAME Cisco Firepower Threat Defense Software denial of service Platforms Affected:Cisco Firepower Threat Defense Software 7.0.0Risk Level:8.6Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION...

Read MoreRead more about Cisco Firepower Threat Defense Software denial of service | CVE-2022-20751
CVE-prog
  • Vulnerabilities

Ballcat Codegen code execution | CVE-2022-24881

April 28, 2022

NAME Ballcat Codegen code execution Platforms Affected:Ballcat Codegen Ballcat Codegen 1.0.0.beta.1Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Ballcat Codegen could allow a remote...

Read MoreRead more about Ballcat Codegen code execution | CVE-2022-24881
CVE-prog
  • Vulnerabilities

Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software privilege escalation | CVE-2022-20759

April 28, 2022

NAME Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software privilege escalation Platforms Affected:Cisco Adaptive Security Appliance Software Cisco...

Read MoreRead more about Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software privilege escalation | CVE-2022-20759
CVE-prog
  • Vulnerabilities

Google Chrome Dev Tools code execution | CVE-2022-1493

April 28, 2022

NAME Google Chrome Dev Tools code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote...

Read MoreRead more about Google Chrome Dev Tools code execution | CVE-2022-1493
CVE-prog
  • Vulnerabilities

Google Chrome File System API code execution | CVE-2022-1485

April 28, 2022

NAME Google Chrome File System API code execution Platforms Affected:Google Chrome 101.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a...

Read MoreRead more about Google Chrome File System API code execution | CVE-2022-1485
CVE-prog
  • Vulnerabilities

IRISNext web application command execution | CVE-2022-26111

April 28, 2022

NAME IRISNext web application command execution Platforms Affected:IRISNext web application 9.8.28Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION IRISNext web application could allow a...

Read MoreRead more about IRISNext web application command execution | CVE-2022-26111
CVE-prog
  • Vulnerabilities

FreeRDP security bypass | CVE-2022-24882

April 28, 2022

NAME FreeRDP security bypass Platforms Affected:FreeRDP FreeRDP 2.6.1Risk Level:9.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION FreeRDP could allow a remote attacker to bypass security...

Read MoreRead more about FreeRDP security bypass | CVE-2022-24882

Posts pagination

Previous 1 … 3,554 3,555 3,556 3,557 3,558 3,559 3,560 … 4,365 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Bizcom Electronics

August 20, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: abfe

August 20, 2025
image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: Expert E-commerce GmbH

August 20, 2025
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: Netstar_South_Africa

August 20, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: HK Hardware & Engineering

August 20, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel