Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

NSO Group, Positive Technologies and other firms sanctioned by the US government

November 3, 2021

The U.S. sanctioned four companies for the development of surveillance malware or the sale of hacking tools used by nation-state...

Read MoreRead more about NSO Group, Positive Technologies and other firms sanctioned by the US government
load
  • News

Credit card skimmer evades Virtual Machines

November 3, 2021

This blog post was authored by Jérôme Segura There are many techniques threat actors use to slow down analysis or,...

Read MoreRead more about Credit card skimmer evades Virtual Machines
CVE-prog
  • Vulnerabilities

CVE-2021-31849

November 3, 2021

Summary: SQL injection vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.7.100 allows a remote attacker logged...

Read MoreRead more about CVE-2021-31849
CVE-prog
  • Vulnerabilities

CVE-2015-20067

November 3, 2021

Summary: The WP Attachment Export WordPress plugin before 0.2.4 does not have proper access controls, allowing unauthenticated users to download...

Read MoreRead more about CVE-2015-20067
CVE-prog
  • Vulnerabilities

CVE-2018-25019

November 3, 2021

Summary: The LearnDash LMS WordPress plugin before 2.5.4 does not have any authorisation and validation of the file to be...

Read MoreRead more about CVE-2018-25019
CVE-prog
  • Vulnerabilities

CVE-2021-29875

November 3, 2021

Summary: IBM InfoSphere Information Server 11.7 could allow an attacker to obtain sensitive information due to a insecure third party...

Read MoreRead more about CVE-2021-29875
CVE-prog
  • Vulnerabilities

CVE-2020-18438

November 3, 2021

Summary: Directory traversal vulnerability in qinggan phpok 5.1, allows attackers to disclose sensitive information, via the title parameter to admin.php....

Read MoreRead more about CVE-2020-18438
osint
  • News

Update now! Mozilla fixes security vulnerabilities in Firefox 94

November 3, 2021

In a security advisory, Mozilla’s announced that several security issues in its Firefox browser have been fixed. Several of these...

Read MoreRead more about Update now! Mozilla fixes security vulnerabilities in Firefox 94
osint
  • News

Trojan Source: Hiding malicious code in plain sight

November 3, 2021

Researchers at the University of Cambridge, UK, have released details of a cunning and insidious new class of software vulnerability...

Read MoreRead more about Trojan Source: Hiding malicious code in plain sight
osint
  • News

BlackMatter ransomware group announces shutdown. But for how long?

November 3, 2021

The BlackMatter ransomware gang has announced they are going to shut down their operation, citing pressure from local authorities. And...

Read MoreRead more about BlackMatter ransomware group announces shutdown. But for how long?
HandleKatz_1_HandleKatz-759940
  • Tools

HandleKatz – PIC Lsass Dumper Using Cloned Handles

November 3, 2021

This tool was implemented as part of our Brucon2021 conference talk and demonstrates the usage of cloned handles to Lsass...

Read MoreRead more about HandleKatz – PIC Lsass Dumper Using Cloned Handles
osint
  • News

Cybercrime underground flooded with offers for initial access to shipping and logistics orgs

November 3, 2021

Experts warn of the availability in the cybercrime underground of offers for initial access to networks of players in global...

Read MoreRead more about Cybercrime underground flooded with offers for initial access to shipping and logistics orgs
osint
  • News

BlackMatter ransomware gang is shutting down due to pressure from law enforcement

November 3, 2021

The BlackMatter ransomware gang announced it is going to shut down its operation due to pressure from law enforcement. The...

Read MoreRead more about BlackMatter ransomware gang is shutting down due to pressure from law enforcement
osint
  • News

Google fixes actively exploited Zero-Day Kernel flaw in Android

November 3, 2021

Google’s Android November 2021 security updates address a zero-day vulnerability in the Kernel that is actively exploited in the wild....

Read MoreRead more about Google fixes actively exploited Zero-Day Kernel flaw in Android
FAKE-DIS-600x294-1
  • News

This Steam phish baits you with free Discord Nitro

November 3, 2021

Weeks ago, we talked about the one effective lure that could get a Discord user to consider clicking on a...

Read MoreRead more about This Steam phish baits you with free Discord Nitro
osint
  • News

Facebook is going to shut down Face Recognition system and data it collected

November 2, 2021

Facebook announced to shut down its Face Recognition system and is going to delete over 1 billion people’s facial recognition...

Read MoreRead more about Facebook is going to shut down Face Recognition system and data it collected
cl0p
  • Data Breach
  • Ransomware

cl0p Ransomware Victim: genesisnet-com

November 2, 2021

NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog...

Read MoreRead more about cl0p Ransomware Victim: genesisnet-com
cl0p
  • Data Breach
  • Ransomware

cl0p Ransomware Victim: ssmsjustice-com

November 2, 2021

NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog...

Read MoreRead more about cl0p Ransomware Victim: ssmsjustice-com
cl0p
  • Data Breach
  • Ransomware

cl0p Ransomware Victim: storafile-co-uk

November 2, 2021

NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog...

Read MoreRead more about cl0p Ransomware Victim: storafile-co-uk
blm_logo
  • Data Breach
  • Ransomware

BlackMatter Ransomware Victim: ZKTeco USA

November 2, 2021

BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...

Read MoreRead more about BlackMatter Ransomware Victim: ZKTeco USA
blm_logo
  • Data Breach
  • Ransomware

BlackMatter Ransomware Victim: Armour Transportation Systems

November 2, 2021

BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...

Read MoreRead more about BlackMatter Ransomware Victim: Armour Transportation Systems
blm_logo
  • Data Breach
  • Ransomware

BlackMatter Ransomware Victim: Home State Bank

November 2, 2021

BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...

Read MoreRead more about BlackMatter Ransomware Victim: Home State Bank
blm_logo
  • Data Breach
  • Ransomware

BlackMatter Ransomware Victim: Keycentrix

November 2, 2021

BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...

Read MoreRead more about BlackMatter Ransomware Victim: Keycentrix
blm_logo
  • Data Breach
  • Ransomware

BlackMatter Ransomware Victim: National Beverage

November 2, 2021

BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...

Read MoreRead more about BlackMatter Ransomware Victim: National Beverage

Posts pagination

Previous 1 … 3,781 3,782 3,783 3,784 3,785 3,786 3,787 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel