Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2021-39225

October 29, 2021

Summary: Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3...

Read MoreRead more about CVE-2021-39225
CVE-prog
  • Vulnerabilities

CVE-2021-34781

October 29, 2021

Summary: A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could...

Read MoreRead more about CVE-2021-34781
CVE-prog
  • Vulnerabilities

CVE-2021-34783

October 29, 2021

Summary: A vulnerability in the software-based SSL/TLS message handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense...

Read MoreRead more about CVE-2021-34783
osint
  • News

NSA and CISA explained how to prevent and detect lateral movement in 5G networks via cloud systems

October 29, 2021

The US NSA and CISA published a security advisory to warn about threat actors compromising 5G networks via cloud infrastructure....

Read MoreRead more about NSA and CISA explained how to prevent and detect lateral movement in 5G networks via cloud systems
osint
  • News

Shrootless: Microsoft finds Apple macOS vulnerability

October 29, 2021

Microsoft researchers have discovered a vulnerability in macOS, dubbed Shrootless, that can allow attackers to bypass System Integrity Protection (SIP)...

Read MoreRead more about Shrootless: Microsoft finds Apple macOS vulnerability
osint
  • Tools

Http-Protocol-Exfil – Exfiltrate Files Using The HTTP Protocol Version (“HTTP/1.0” Is A 0 And “HTTP/1.1” Is A 1)

October 29, 2021

Use the HTTP protocol version to send a file bit by bit ("HTTP/1.0" is a 0 and "HTTP/1.1" is a...

Read MoreRead more about Http-Protocol-Exfil – Exfiltrate Files Using The HTTP Protocol Version (“HTTP/1.0” Is A 0 And “HTTP/1.1” Is A 1)
cyber-security-1805632_1280
  • Vulnerabilities

CVE-2021-33044 – Dahua Technology / Multiple – Improper authentication

October 29, 2021

Summary: CVE-2021-33044 is an improper authentication vulnerability impacting multiple Dahua products. An exploit was observed in open source and a...

Read MoreRead more about CVE-2021-33044 – Dahua Technology / Multiple – Improper authentication
cyber-security-1805632_1280
  • Vulnerabilities

CVE-2021-33045 – Dahua Technology / Multiple – Improper authentication

October 29, 2021

Summary: CVE-2021-33045 is an improper authentication vulnerability impacting multiple Dahua products. An exploit was observed in open source and a...

Read MoreRead more about CVE-2021-33045 – Dahua Technology / Multiple – Improper authentication
sl_abstract_nodes-990x400-1
  • News

How we took part in MLSEC and (almost) won

October 29, 2021

This summer Kaspersky experts took part in the Machine Learning Security Evasion Competition (MLSEC) — a series of trials testing...

Read MoreRead more about How we took part in MLSEC and (almost) won
osint
  • News

Microsoft found Shrootless bug in macOS that could bypass System Integrity Protection

October 29, 2021

Microsoft finds a flaw in macOS, dubbed Shrootless (CVE-2021-30892), that can allow attackers to bypass System Integrity Protection (SIP). Microsoft discovered a...

Read MoreRead more about Microsoft found Shrootless bug in macOS that could bypass System Integrity Protection
osint
  • News

Over 1 million WordPress sites affected by OptinMonster plugin flaws

October 28, 2021

A vulnerability in the popular the OptinMonster plugin allows unauthorized API access and sensitive information disclosure. A high-severity vulnerability (CVE-2021-39341)...

Read MoreRead more about Over 1 million WordPress sites affected by OptinMonster plugin flaws
HTTPUploadExfil_1_example-1-729049
  • Tools

HTTPUploadExfil – A Simple HTTP Server For Exfiltrating Files/Data During, For Example, CTFs

October 28, 2021

HTTPUploadExfil is a (very) simple HTTP server written in Go that's useful for getting files (and other information) off a...

Read MoreRead more about HTTPUploadExfil – A Simple HTTP Server For Exfiltrating Files/Data During, For Example, CTFs
osint
  • News

Wslink, a previously undescribed loader for Windows binaries

October 28, 2021

ESET researchers discovered a previously undescribed loader for Windows binaries, tracked as Wslink, that runs as a server and executes...

Read MoreRead more about Wslink, a previously undescribed loader for Windows binaries
osint
  • News

AbstractEmu, a new Android malware with rooting capabilities

October 28, 2021

AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security...

Read MoreRead more about AbstractEmu, a new Android malware with rooting capabilities
osint
  • News

Threat profile: Ranzy Locker ransomware

October 28, 2021

Ranzy Locker ransomware emerged in late 2020, when the variant began to target victims in the United States. According to a flash alert issued...

Read MoreRead more about Threat profile: Ranzy Locker ransomware
CVE-prog
  • Vulnerabilities

CVE-2020-28969

October 28, 2021

Summary: Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via...

Read MoreRead more about CVE-2020-28969
CVE-prog
  • Vulnerabilities

CVE-2019-10240

October 28, 2021

Summary: Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of...

Read MoreRead more about CVE-2019-10240
CVE-prog
  • Vulnerabilities

CVE-2021-24487

October 28, 2021

Summary: The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text...

Read MoreRead more about CVE-2021-24487
CVE-prog
  • Vulnerabilities

CVE-2021-34854

October 28, 2021

Summary: This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must...

Read MoreRead more about CVE-2021-34854
CVE-prog
  • Vulnerabilities

CVE-2021-34762

October 28, 2021

Summary: A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote...

Read MoreRead more about CVE-2021-34762
osint
  • News

German investigators identify crypto millionaire behind REvil operations

October 28, 2021

German authorities have identified a Russian man named Nikolay K. who is suspected to be a prominent member of the...

Read MoreRead more about German investigators identify crypto millionaire behind REvil operations
DonPAPI_1_Logo252520DonPapi-729454
  • Tools

DonPAPI – Dumping DPAPI Credz Remotely

October 28, 2021

Dumping revelant information on compromised targets without AV detection  DPAPI dumpingLots of credentials are protected by DPAPI. We aim at...

Read MoreRead more about DonPAPI – Dumping DPAPI Credz Remotely
osint
  • News

What is fileless malware?

October 28, 2021

Unlike traditional malware, which relies on a file being written to a disk, fileless malware is intended to be memory...

Read MoreRead more about What is fileless malware?
1f366
  • News

Crooks steal $130 million worth of cryptocurrency assets from Cream Finance

October 28, 2021

Threat actors have stolen $130 million worth of cryptocurrency assets from the Cream Finance decentralized finance (DeFi) platform. C.R.E.A.M. Finance...

Read MoreRead more about Crooks steal $130 million worth of cryptocurrency assets from Cream Finance

Posts pagination

Previous 1 … 3,785 3,786 3,787 3,788 3,789 3,790 3,791 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel