Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
loader-1
  • News

q-logger skimmer keeps Magecart attacks going

October 19, 2021

This blog post was authored by Jérôme Segura Although global e-commerce is continuing to grow rapidly, it seems as though...

Read MoreRead more about q-logger skimmer keeps Magecart attacks going
osint
  • Tools

LazyCSRF – A More Useful CSRF PoC Generator

October 19, 2021

LazyCSRF is a more useful CSRF PoC  InstallationDownload the jar from LICENSEMIT LicenseCopyright (C) 2021 tkmruDownload lazyCSRF If you like...

Read MoreRead more about LazyCSRF – A More Useful CSRF PoC Generator
osint
  • News

Experts found many similarities between the new Karma Ransomware and Nemty variants

October 19, 2021

Sentinel Labs experts have analyzed the new Karma ransomware and speculate it represents an evolution of the Nemty ransomware operation....

Read MoreRead more about Experts found many similarities between the new Karma Ransomware and Nemty variants
osint
  • News

Protect yourself from BlackMatter ransomware: Advice issued

October 19, 2021

Despite promises made by the BlackMatter ransomware gang about which organizations and business types they would avoid, multiple US critical...

Read MoreRead more about Protect yourself from BlackMatter ransomware: Advice issued
osint
  • News

REvil ransomware gang disappears after Tor services hijacked

October 19, 2021

With some pests you hope they never recover from a blow. It’s almost too good to be true, but one...

Read MoreRead more about REvil ransomware gang disappears after Tor services hijacked
osint
  • News

Symantec uncovered a previously unknown nation-state actor, named Harvester, that targeted telcos

October 19, 2021

Symantec spotted a previously unknown nation-state actor, tracked as Harvester, that is targeting telecommunication providers and IT firms in South...

Read MoreRead more about Symantec uncovered a previously unknown nation-state actor, named Harvester, that targeted telcos
osint
  • Tools

Karma_V2 – A Passive Open Source Intelligence (OSINT) Automated Reconnaissance (Framework)

October 19, 2021

𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 is a Passive Open Source MODEsMODEExamples-ip bash karma_v2 -d <DOMAIN.TLD> -l <INTEGER> -ip-asn bash karma_v2 -d <DOMAIN.TLD> -l...

Read MoreRead more about Karma_V2 – A Passive Open Source Intelligence (OSINT) Automated Reconnaissance (Framework)
osint
  • News

FBI, CISA, NSA published a joint advisory on BlackMatter ransomware operations

October 19, 2021

FBI, CISA, NSA have published a joint advisory about the operation of the BlackMatter ransomware gang and provides defense recommendations....

Read MoreRead more about FBI, CISA, NSA published a joint advisory on BlackMatter ransomware operations
osint
  • News

Trustwave released a free decryptor for the BlackByte ransomware

October 19, 2021

Trustwave’s SpiderLabs researchers have released a free decryptor for the BlackByte ransomware that can allow victims to recover their files....

Read MoreRead more about Trustwave released a free decryptor for the BlackByte ransomware
abstract_red_east-990x400-1
  • News

Lyceum group reborn

October 19, 2021

This year, we had the honor to be selected for the thirty-first edition of the Virus Bulletin conference. During the...

Read MoreRead more about Lyceum group reborn
CISA_Logo
  • News

US-CERT Bulletin (SB21-291):Vulnerability Summary for the Week of October 11, 2021

October 19, 2021

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...

Read MoreRead more about US-CERT Bulletin (SB21-291):Vulnerability Summary for the Week of October 11, 2021
osint
  • Tools

Inceptor – Template-Driven AV/EDR Evasion Framework

October 18, 2021

Modern Penetration testing and Red Teaming often requires to bypass common AV/EDR appliances in order to execute code on a...

Read MoreRead more about Inceptor – Template-Driven AV/EDR Evasion Framework
osint
  • News

TeamTNT Deploys Malicious Docker Image On Docker Hub

October 18, 2021

The Uptycs Threat Research Team spotted a campaign in which the TeamTNT threat actors deployed a malicious container image on...

Read MoreRead more about TeamTNT Deploys Malicious Docker Image On Docker Hub
osint
  • News

Prometheus endpoint unprotected installs could expose sensitive data

October 18, 2021

Experts discovered several unprotected installs of open source event monitoring solution Prometheus that may expose sensitive data. JFrog researchers have...

Read MoreRead more about Prometheus endpoint unprotected installs could expose sensitive data
osint
  • News

“Killware”: Is it just as bad as it sounds?

October 18, 2021

On October 12, after interviewing US Secretary of Homeland Security Alejandro Mayorkas, USA TODAY’s editorial board warned its readers about...

Read MoreRead more about “Killware”: Is it just as bad as it sounds?
osint
  • News

Multiple vulnerabilities in popular WordPress plugin WP Fastest Cache

October 18, 2021

Multiple vulnerabilities have been found in the popular WordPress plugin WP Fastest Cache during an internal audit by the Jetpack...

Read MoreRead more about Multiple vulnerabilities in popular WordPress plugin WP Fastest Cache
osint
  • News

A week in security (Oct 11 – Oct 17)

October 18, 2021

Last week on Malwarebytes Labs Google warns some users that FancyBear’s been prowling aroundInside Apple: How macOS attacks are evolvingThe...

Read MoreRead more about A week in security (Oct 11 – Oct 17)
1f64f-1f3fc-1
  • News

Sinclair TV stations downtime allegedly caused by a ransomware attack

October 18, 2021

A ransomware attack is likely the cause of the recent downtime for TV stations owned by the Sinclair Broadcast Group...

Read MoreRead more about Sinclair TV stations downtime allegedly caused by a ransomware attack
osint
  • Tools

ImpulsiveDLLHijack – C# Based Tool Which Automates The Process Of Discovering And Exploiting DLL Hijacks In Target Binaries

October 18, 2021

C# based tool which automates the process of discovering and 4. Examples:Target Executable: OneDrive.exeStage: DiscoveryStage: ExploitationSuccessful DLL Hijacks: Unsuccessful DLL Hijacks: DLL...

Read MoreRead more about ImpulsiveDLLHijack – C# Based Tool Which Automates The Process Of Discovering And Exploiting DLL Hijacks In Target Binaries
1faa6
  • News

REvil ransomware operation shuts down once again

October 18, 2021

It seems that the REvil ransomware operation has shut down once again after a threat actor has hijacked their Tor...

Read MoreRead more about REvil ransomware operation shuts down once again
osint
  • News

Experts spotted an Ad-Blocking Chrome extension injecting malicious ads

October 18, 2021

Researchers warn of an Ad-Blocking Chrome extension that was abused by threat actors to Injecting Ads in Google search pages....

Read MoreRead more about Experts spotted an Ad-Blocking Chrome extension injecting malicious ads
osint
  • Tools

Fapro – Free, Cross-platform, Single-file mass network protocol server simulator

October 17, 2021

FaPro is a Fake Protocol Server tool, Can easily start or stop multiple network services.The goal is to support as...

Read MoreRead more about Fapro – Free, Cross-platform, Single-file mass network protocol server simulator
1f389
  • News

Experts hacked a fully patched iOS 15 running on iPhone 13 at China’s Tianfu Cup hacking contest

October 17, 2021

White hat hackers earned $1.88 million at the Tianfu Cup hacking contest by finding vulnerabilities in popular software. The Tianfu...

Read MoreRead more about Experts hacked a fully patched iOS 15 running on iPhone 13 at China’s Tianfu Cup hacking contest
CVE-prog
  • Vulnerabilities

CVE-2021-41773

October 17, 2021

Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...

Read MoreRead more about CVE-2021-41773

Posts pagination

Previous 1 … 3,792 3,793 3,794 3,795 3,796 3,797 3,798 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel