Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials: A Practical Roadmap for Modern Infrastructures

August 11, 2025
unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

TP-Link AC1750 code execution | CVE-2022-24353

February 12, 2022

NAME TP-Link AC1750 code execution Platforms Affected:TP-Link Archer A7 AC1750Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION TP-Link AC1750 could allow a remote attacker...

Read MoreRead more about TP-Link AC1750 code execution | CVE-2022-24353
CVE-prog
  • Vulnerabilities

Schneider Electric spaceLYnk, Wiser for KNX, fellerLYnk security bypass | CVE-2022-22809

February 12, 2022

NAME Schneider Electric spaceLYnk, Wiser for KNX, fellerLYnk security bypass Platforms Affected:Schneider Electric spaceLYnk 2.6.2 Schneider Electric Wiser for KNX...

Read MoreRead more about Schneider Electric spaceLYnk, Wiser for KNX, fellerLYnk security bypass | CVE-2022-22809
CVE-prog
  • Vulnerabilities

TP-Link TL-WR940N buffer overflow | CVE-2022-24355

February 12, 2022

NAME TP-Link TL-WR940N buffer overflow Platforms Affected:TP-LINK TL-WR940NRisk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION TP-Link TL-WR940N is vulnerable to a stack-based buffer overflow,...

Read MoreRead more about TP-Link TL-WR940N buffer overflow | CVE-2022-24355
CVE-prog
  • Vulnerabilities

Sonos One Speaker code execution | CVE-2022-24046

February 12, 2022

NAME Sonos One Speaker code execution Platforms Affected:Sonos One Speaker 11.2.13 build 57923290Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Sonos One Speaker could...

Read MoreRead more about Sonos One Speaker code execution | CVE-2022-24046
osint
  • News

FritzFrog P2P Botnet is back and targets Healthcare, Education and Government Sectors

February 12, 2022

FritzFrog P2P botnet is back and is targeting servers belonging to entities in the healthcare, education, and government sectors. FritzFrog...

Read MoreRead more about FritzFrog P2P Botnet is back and targets Healthcare, Education and Government Sectors
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 84[.]32[.]188[.]238:443

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 84[.]32[.]188[.]238:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 139[.]180[.]161[.]20:443

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 139[.]180[.]161[.]20:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 39[.]102[.]34[.]44:80

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 39[.]102[.]34[.]44:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 5[.]39[.]223[.]130:80

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 5[.]39[.]223[.]130:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 5[.]2[.]75[.]40:443

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 5[.]2[.]75[.]40:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 106[.]13[.]54[.]144:443

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 106[.]13[.]54[.]144:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 139[.]60[.]161[.]227:80

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 139[.]60[.]161[.]227:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 139[.]60[.]161[.]24:443

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 139[.]60[.]161[.]24:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 158[.]247[.]202[.]160:443

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 158[.]247[.]202[.]160:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 123[.]56[.]82[.]231:8080

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 123[.]56[.]82[.]231:8080
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 158[.]140[.]238[.]253:443

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 158[.]140[.]238[.]253:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 39[.]103[.]129[.]63:8888

February 12, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 39[.]103[.]129[.]63:8888
osint
  • News

3 cybersecurity trends & mitigation strategies for CISOs

February 11, 2022

Explore 3 cyber security trends and how to strategically mitigate future risks with Trend Micro’s Jon Clay, VP of threat...

Read MoreRead more about 3 cybersecurity trends & mitigation strategies for CISOs
osint
  • News

This Week in Security News – February 11, 2022

February 11, 2022

Hidden scams in malicious scans, and feds arrest couple who allegedly laundered $1 Billion in stolen bitcoins If you like...

Read MoreRead more about This Week in Security News – February 11, 2022
osint
  • News

Detecting PwnKit (CVE-2021-4034) Using Trend Micro™ Vision One™ and Cloud One™

February 11, 2022

This blog discusses how CVE-2021-4034 can be detected and blocked using Trend Micro™ Vision One™ and Trend Micro Cloud One™....

Read MoreRead more about Detecting PwnKit (CVE-2021-4034) Using Trend Micro™ Vision One™ and Cloud One™
osint
  • News

CISA adds 15 new vulnerabilities to its Known Exploited Vulnerabilities Catalog

February 11, 2022

The U.S. CISA has added to the catalog of vulnerabilities another 15 security vulnerabilities actively exploited in the wild. The...

Read MoreRead more about CISA adds 15 new vulnerabilities to its Known Exploited Vulnerabilities Catalog
dive_4_demo-778677
  • Tools

Dive – A Tool For Exploring Each Layer In A Docker Image

February 11, 2022

A tool for exploring a docker image, layer contents, and discovering ways to shrink the size of your Docker/OCI image....

Read MoreRead more about Dive – A Tool For Exploring Each Layer In A Docker Image
osint
  • News

Apple addressed a third zero-day in 2022, which is actively exploited

February 11, 2022

Apple addressed a new WebKit zero-day affecting iOS, iPadOS, macOS, and Safari that may have been actively exploited in the wild. Apple...

Read MoreRead more about Apple addressed a third zero-day in 2022, which is actively exploited
osint
  • News

Online Safety Bill will legally require porn sites to verify users’ age

February 11, 2022

When Ioannis Dekas, a father of four boys, found that one of his sons had access to pornography, he and...

Read MoreRead more about Online Safety Bill will legally require porn sites to verify users’ age

Posts pagination

Previous 1 … 3,692 3,693 3,694 3,695 3,696 3,697 3,698 … 4,338 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-54228

August 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54232

August 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54222

August 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54230

August 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54231

August 13, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel