Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Popular Android apps with 142.5 million collective installs leak user data

September 30, 2021

14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties Original post @...

Read MoreRead more about Popular Android apps with 142.5 million collective installs leak user data
SharpML_1_sharpml_logic-785687
  • Tools

SharpML – Machine Learning Network Share Password Hunting Toolkit

September 30, 2021

SharpML is a proof of concept file share data mining tool using Machine Learning in Python and C#. The tool...

Read MoreRead more about SharpML – Machine Learning Network Share Password Hunting Toolkit
osint
  • News

Android Trojan GriftHorse, the gift horse you definitely should look in the mouth

September 30, 2021

Researchers at Zimperium have discovered an aggressive mobile premium services campaign with over 10 million victims all over the world....

Read MoreRead more about Android Trojan GriftHorse, the gift horse you definitely should look in the mouth
actor-flex-437x600-1
  • News

Telegram-powered bots circumvent 2FA

September 30, 2021

Two-factor authentication is a great way to protect your online accounts, and we always recommend you turn it on. But...

Read MoreRead more about Telegram-powered bots circumvent 2FA
hacker-6586113_1280
  • News

Cybersecurity experts have discovered a new hacker group

September 30, 2021

Cybersecurity experts have discovered a new hacker group ChamelGang, which attacks institutions in ten countries around the world, including Russia....

Read MoreRead more about Cybersecurity experts have discovered a new hacker group
osint
  • News

Scammers are Using Twitter Bots for PayPal and Venmo Scams

September 30, 2021

 Internet scammers are using Twitter bots to trick users into making PayPal and Venmo payments to accounts under their possession....

Read MoreRead more about Scammers are Using Twitter Bots for PayPal and Venmo Scams
osint
  • News

Bandwidth Suffers Outages Caused by DDoS Attack

September 30, 2021

 Within the last couple of days, Bandwidth.com has been the latest target of distributed denial of service attacks targeting VoIP...

Read MoreRead more about Bandwidth Suffers Outages Caused by DDoS Attack
osint
  • News

Nobelium APT Group Uses Custom Backdoor to Target Windows Domains

September 30, 2021

 Researchers from Microsoft Threat Intelligence Center (MSTIC) identified FoggyWeb, a new custom malware utilized by the Nobelium APT group to...

Read MoreRead more about Nobelium APT Group Uses Custom Backdoor to Target Windows Domains
china-g43524c11b_1920
  • News

Threat Actors from China Infiltrated a Major Afghan Telecom Provider

September 30, 2021

 Just as the US was completing its withdrawal from Afghanistan, several China-linked cyberespionage groups were seen intensifying attacks on a...

Read MoreRead more about Threat Actors from China Infiltrated a Major Afghan Telecom Provider
1f1ee-1f1f9-3-1
  • News

Threat actors use recently discovered CVE-2021-26084 Atlassian Confluence

September 30, 2021

Threat actors are actively exploiting the recently disclosed CVE-2021-26084 RCE vulnerability in Atlassian Confluence deployments. Trend Micro researchers have spotted...

Read MoreRead more about Threat actors use recently discovered CVE-2021-26084 Atlassian Confluence
osint
  • News

CISA releases Insider Risk Mitigation Self-Assessment Tool

September 30, 2021

The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider...

Read MoreRead more about CISA releases Insider Risk Mitigation Self-Assessment Tool
osint
  • News

Facebook released Mariana Trench tool to find flaws in Android and Java apps

September 30, 2021

Facebook released Mariana Trench, an internal open-source tool that can be used to identify vulnerabilities in Android and Java applications....

Read MoreRead more about Facebook released Mariana Trench tool to find flaws in Android and Java apps
osint
  • News

Expert discloses new iPhone lock screen vulnerability in iOS 15

September 30, 2021

The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet...

Read MoreRead more about Expert discloses new iPhone lock screen vulnerability in iOS 15
CVE-prog
  • Vulnerabilities

CVE-2020-1416

September 30, 2021

Summary: An elevation of privilege vulnerability exists in Visual Studio and Visual Studio Code when they load software dependencies, aka...

Read MoreRead more about CVE-2020-1416
CVE-prog
  • Vulnerabilities

CVE-2020-1416

September 30, 2021

Summary: An elevation of privilege vulnerability exists in Visual Studio and Visual Studio Code when they load software dependencies, aka...

Read MoreRead more about CVE-2020-1416
CVE-prog
  • Vulnerabilities

CVE-2021-22019

September 30, 2021

Summary: The vCenter Server contains a denial-of-service vulnerability in VAPI (vCenter API) service. A malicious actor with network access to...

Read MoreRead more about CVE-2021-22019
CVE-prog
  • Vulnerabilities

CVE-2020-9759

September 30, 2021

Summary: A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain...

Read MoreRead more about CVE-2020-9759
CVE-prog
  • Vulnerabilities

CVE-2021-40516

September 30, 2021

Summary: WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that...

Read MoreRead more about CVE-2021-40516
CVE-prog
  • Vulnerabilities

CVE-2021-22949

September 30, 2021

Summary: A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to duplicate files which can lead to...

Read MoreRead more about CVE-2021-22949
portpass-reveal-600x344-1
  • News

Vaccine passport app leaks users’ personal data

September 30, 2021

Security and privacy advocates may have cause to worry after all: Portpass, a vaccine passport app in Canada, has been...

Read MoreRead more about Vaccine passport app leaks users’ personal data
CISA_question-600x188-1
  • News

Microsoft, CISA and NSA offer security tools and advice, but will you take it?

September 30, 2021

Microsoft offers to help you with patching Exchange servers, CISA offers an insider threat tool, and together with the NSA...

Read MoreRead more about Microsoft, CISA and NSA offer security tools and advice, but will you take it?
1f637-1
  • News

Instagram Kids put on hold

September 30, 2021

Instagram has announced it is pausing the development of its newest brainchild, Instagram Kids—a version of Instagram aimed at 10-12-year-olds,...

Read MoreRead more about Instagram Kids put on hold
cyber-security-2851245_1280
  • News

Japan mentioned Russia in its new cybersecurity strategy

September 30, 2021

The Japanese government on Tuesday officially approved a new three-year cybersecurity strategy, where Russia, China and North Korea are mentioned...

Read MoreRead more about Japan mentioned Russia in its new cybersecurity strategy
osint
  • News

Kids Fairy Tale App Farfaria Exposed Data of 2.9 Million Users

September 30, 2021

 Cybersecurity researcher at Comparitech has identified a misconfigured MongoDB database containing a treasure trove of data left uncovered to the...

Read MoreRead more about Kids Fairy Tale App Farfaria Exposed Data of 2.9 Million Users

Posts pagination

Previous 1 … 3,805 3,806 3,807 3,808 3,809 3,810 3,811 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel