Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
cyber-3327240_1920
  • News

Furniture Village Hit by a Week-Long Cyber Attack

June 5, 2021

 Customers have been left 'with nothing to sit on' and unable to pay while waiting for sofas, beds, and tables...

Read MoreRead more about Furniture Village Hit by a Week-Long Cyber Attack
pexels-markus-spiske-1089438
  • News

What is Email Spoofing? How Hackers Impersonate Legitimate Senders

June 5, 2021

 Email spoofing is easily the most commonly employed way by threat actors for initiating phishing and spam attacks. Normally, hackers...

Read MoreRead more about What is Email Spoofing? How Hackers Impersonate Legitimate Senders
osint
  • News

Vulnerabilties Found in Realtek Module

June 5, 2021

A new type of severe rated vulnerabilities has been revealed in the Realtek RTL8170C Wi-Fi module. A hacker could exploit...

Read MoreRead more about Vulnerabilties Found in Realtek Module
shahadat-rahman-BfrQnKBulYQ-unsplash-2
  • News

FujiFilm Shuts Down Network Following Ransomware Attack

June 5, 2021

 Japanese multinational conglomerate FujiFilm, headquartered in Tokyo suffered a ransomware attack on Tuesday night. The company has shut down portions...

Read MoreRead more about FujiFilm Shuts Down Network Following Ransomware Attack
metarget
  • Tools

Metarget – Framework Providing Automatic Constructions Of Vulnerable Infrastructures

June 5, 2021

1 IntroductionMetarget = meta- + target, a framework providing automatic constructions of vulnerable infrastructures, used to deploy simple or complicated...

Read MoreRead more about Metarget – Framework Providing Automatic Constructions Of Vulnerable Infrastructures
Penglab
  • Tools

Penglab – Abuse Of Google Colab For Cracking Hashes

June 5, 2021

Abuse of Google Colab for fun and profit. What is it ?Penglab is a ready-to-install setup on Google Colab for...

Read MoreRead more about Penglab – Abuse Of Google Colab For Cracking Hashes
osint
  • News

China-linked attackers breached Metropolitan Transportation Authority (MTA) using Pulse Secure zero-day

June 4, 2021

China-linked APT breached New York City’s Metropolitan Transportation Authority (MTA) network in April using a Pulse Secure zero-day. China-linked threat...

Read MoreRead more about China-linked attackers breached Metropolitan Transportation Authority (MTA) using Pulse Secure zero-day
osint
  • News

The dark web index 2021, report

June 4, 2021

PrivacyAffairs released the Dark Web Index 2021, the document provides the prices for illegal services/products available in the black marketplaces....

Read MoreRead more about The dark web index 2021, report
osint
  • News

Trend Micro details CVE-2021-30724 privilege escalation flaw in macOS, iOS

June 4, 2021

Trend Micro disclosed technical details of a patched privilege escalation issue, tracked as CVE-2021-30724, that impacts macOS, iOS and iPadOS....

Read MoreRead more about Trend Micro details CVE-2021-30724 privilege escalation flaw in macOS, iOS
osint
  • News

Cisco fixes High-severity issues in Webex, SD-WAN, ASR 5000 software

June 4, 2021

Cisco addressed multiple security flaws, including high-severity vulnerabilities, in Webex Player, SD-WAN software, and ASR 5000 series software. Cisco has...

Read MoreRead more about Cisco fixes High-severity issues in Webex, SD-WAN, ASR 5000 software
CVE-prog
  • Vulnerabilities

CVE-2020-4300

June 4, 2021

Summary: IBM Cognos Analytics 11.0 and 11.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML...

Read MoreRead more about CVE-2020-4300
CVE-prog
  • Vulnerabilities

CVE-2021-22734

June 4, 2021

Summary: Improper Verification of Cryptographic Signature vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could...

Read MoreRead more about CVE-2021-22734
CVE-prog
  • Vulnerabilities

CVE-2021-22735

June 4, 2021

Summary: Improper Verification of Cryptographic Signature vulnerability exists inhomeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could allow...

Read MoreRead more about CVE-2021-22735
CVE-prog
  • Vulnerabilities

CVE-2021-22736

June 4, 2021

Summary: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in homeLYnk (Wiser For KNX) and...

Read MoreRead more about CVE-2021-22736
CVE-prog
  • Vulnerabilities

CVE-2018-16495

June 4, 2021

Summary: In VOS user session identifier (authentication token) is issued to the browser prior to authentication but is not changed...

Read MoreRead more about CVE-2018-16495
osint
  • News

Cybercrime, fraud, and insider threats increased in 2020 in the UK, report says

June 4, 2021

Since the initial lockdown, we have seen the rise of certain types of cybercrime, including scams and fraud campaigns that...

Read MoreRead more about Cybercrime, fraud, and insider threats increased in 2020 in the UK, report says
schedule-522x600-1
  • News

Steamship Authority answers question: Who’s the next ransomware victim?

June 4, 2021

After the attacks on Colonial Pipeline and JBS, many may have been wondering, as we did, what the next ransomware...

Read MoreRead more about Steamship Authority answers question: Who’s the next ransomware victim?
osint
  • News

Coronavirus phishing: “Welcome back to the office…”

June 4, 2021

As offices start to slowly open back up, the theoretically post-pandemic world is changing its threat landscape once again, and...

Read MoreRead more about Coronavirus phishing: “Welcome back to the office…”
pexels-tima-miroshnichenko-5380664
  • News

Cybercrime Forum Publishes Alleged Database, Source Code From Russian Firm That Helped Parler

June 4, 2021

 A seller on a famous cybercrime website claims to be selling source code and a database that they claim belongs...

Read MoreRead more about Cybercrime Forum Publishes Alleged Database, Source Code From Russian Firm That Helped Parler
myanmar-2697293_1920
  • News

Myanmar President’s Office Hacked for the Second Time

June 4, 2021

 A cyber-espionage hacking gang is suspected of breaking into the Myanmar president's office website and injecting a backdoor trojan into...

Read MoreRead more about Myanmar President’s Office Hacked for the Second Time
smartphone-1284501_1280
  • News

The first users got SIM cards with Russian encryption

June 4, 2021

Voentelecom has started implementing SIM cards that should create a "trusted environment" on smartphones. The transition to such SIM cards...

Read MoreRead more about The first users got SIM cards with Russian encryption
question-mark-5868011_1280
  • News

Every tenth significant IT system in Russia is infected with malware

June 4, 2021

 According to Rostelecom-Solar research, every 10th critical information infrastructure (CII) in the Russian Federation is compromised by malware. Even hackers...

Read MoreRead more about Every tenth significant IT system in Russia is infected with malware
spdiey2Bbot
  • News

Industrial Switches Given by the Vendors Affected by a Same Vulnerability

June 4, 2021

Industrial switches that were given by the vendors have been affected by a same vulnerability, the reason being they all...

Read MoreRead more about Industrial Switches Given by the Vendors Affected by a Same Vulnerability
abstract-e-mail-SL-e1622643637295-990x400-1
  • News

Email spoofing: how attackers impersonate legitimate senders

June 4, 2021

Introduction In a nutshell, email spoofing is the creation of fake emails that seem legitimate. This article analyzes the spoofing...

Read MoreRead more about Email spoofing: how attackers impersonate legitimate senders

Posts pagination

Previous 1 … 3,812 3,813 3,814 3,815 3,816 3,817 3,818 … 4,074 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hkcert
  • HKCERT
  • News

Microsoft Monthly Security Update (May 2025)

May 14, 2025
hkcert
  • HKCERT
  • News

Fortinet Products Multiple Vulnerabilities

May 14, 2025
cybercrime
  • News

Os Busting Bug So Bad That Microsoft Blocks Windows Insider Release

May 14, 2025
cybercrime
  • News

Bosses Weren’t Being Paranoid: Remote Workers More Likely To Start Own Biz

May 14, 2025
cybercrime
  • News

Paul Mccartney, Elton John, Other Creatives Demand Ai Comes Clean On Scraping

May 14, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel