Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

RMM software: What is it and do you need it?

May 28, 2021

As cybersecurity products evolve to better protect against new forms of malware, trickier evasion techniques, and more organized cybercrime campaigns,...

Read MoreRead more about RMM software: What is it and do you need it?
osint
  • News

Falsifying and weaponizing certified PDFs

May 28, 2021

The Portable Document Format (PDF) file type is one of the most common file formats in use today. It’s value...

Read MoreRead more about Falsifying and weaponizing certified PDFs
osint
  • News

Healthcare service faces test of willpower with Ransomware authors

May 28, 2021

Healthcare and ransomware are in the news in a big way. Data leaks are inevitable, but those are typically associated...

Read MoreRead more about Healthcare service faces test of willpower with Ransomware authors
canada-159585_1280
  • News

Canada Post’s Data Breach Affected 950K Customers

May 28, 2021

 The state-owned postal service, Canada Post has reported that a cyber-attack on a third-party provider resulted in a data breach...

Read MoreRead more about Canada Post’s Data Breach Affected 950K Customers
technology-4816658_1280
  • News

Moscow has completed a large-scale study on the security of 5G

May 28, 2021

The press service of the Moscow Department of Information Technologies informs that the specialists of the Scientific-Research Institute of Metallurgical...

Read MoreRead more about Moscow has completed a large-scale study on the security of 5G
shahadat-rahman-BfrQnKBulYQ-unsplash-4
  • News

Social Media Giants Seek Futher Extension in Deadline to Comply with Government Rules

May 28, 2021

 Social media companies such as Facebook, Twitter, YouTube, Instagram, and WhatsApp will lose their status as ‘intermediaries” that granted them...

Read MoreRead more about Social Media Giants Seek Futher Extension in Deadline to Comply with Government Rules
pexels-kartikey-das-413279
  • News

M1RACLES Bug Impacts Apple M1 Chips

May 28, 2021

 A security researcher identified the first-ever vulnerability in Apple M1 chips that requires a silicon redesign to fix. The good...

Read MoreRead more about M1RACLES Bug Impacts Apple M1 Chips
firmbee-com-eMemmpUojlw-unsplash
  • News

Research Reveals More Than 2000 Chrome Extensions Disabled Security Headers

May 28, 2021

 Tens of thousands of Google Chrome extensions accessible from the official Chrome Online Store manipulate security headers on major websites,...

Read MoreRead more about Research Reveals More Than 2000 Chrome Extensions Disabled Security Headers
dystopia_1_preview
  • Tools

Dystopia – Low To Medium Multithreaded Ubuntu Core Honeypot Coded In Python

May 28, 2021

Low to medium Ubuntu Core honeypot coded in Python.FeaturesOptional Login Prompt Logs commands used and IP addresses Customize MOTD, Port,...

Read MoreRead more about Dystopia – Low To Medium Multithreaded Ubuntu Core Honeypot Coded In Python
FireStorePwn_1
  • Tools

FireStorePwn – Firestore Database Vulnerability Scanner Using APKs

May 28, 2021

fsp scans an APK and checks the Firestore database for rules that are not secure, testing with or without authentication....

Read MoreRead more about FireStorePwn – Firestore Database Vulnerability Scanner Using APKs
osint
  • News

NASA identified 1,785 cyber incidents in 2020

May 27, 2021

NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office...

Read MoreRead more about NASA identified 1,785 cyber incidents in 2020
osint
  • News

Hackers compromised Japanese government offices via Fujitsu ‘s ProjectWEB tool

May 27, 2021

Threat actors have compromised offices of multiple Japanese agencies via Fujitsu ‘s ProjectWEB information sharing tool. Threat actors have breached...

Read MoreRead more about Hackers compromised Japanese government offices via Fujitsu ‘s ProjectWEB tool
osint
  • News

M1RACLES, the unpatchable bug that impacts new Apple M1 chips

May 27, 2021

A security expert has discovered a vulnerability in Apple M1 chips, dubbed M1RACLES, that cannot be fixed. Software engineer Hector...

Read MoreRead more about M1RACLES, the unpatchable bug that impacts new Apple M1 chips
osint
  • News

Nearly 50,000 IPs compromised in Kubernetes clusters by TeamTNT

May 27, 2021

Researchers discovered about 50,000 IPs across multiple Kubernetes clusters that were compromised by the TeamTNT.threat actors. Researchers from Trend Micro reported...

Read MoreRead more about Nearly 50,000 IPs compromised in Kubernetes clusters by TeamTNT
1f3f4-200d-2620-fe0f-1
  • News

French police seized dark web marketplace Le Monde Parallèle

May 27, 2021

Last week, French authorities have seized the dark web marketplace Le Monde Parallèle, it is another success of national police...

Read MoreRead more about French police seized dark web marketplace Le Monde Parallèle
CVE-prog
  • Vulnerabilities

CVE-2021-3480

May 27, 2021

Summary: A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the...

Read MoreRead more about CVE-2021-3480
CVE-prog
  • Vulnerabilities

CVE-2021-33477

May 27, 2021

Summary: rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of...

Read MoreRead more about CVE-2021-33477
CVE-prog
  • Vulnerabilities

CVE-2021-31439

May 27, 2021

Summary: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not...

Read MoreRead more about CVE-2021-31439
CVE-prog
  • Vulnerabilities

CVE-2021-31473

May 27, 2021

Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is...

Read MoreRead more about CVE-2021-31473
CVE-prog
  • Vulnerabilities

CVE-2021-32633

May 27, 2021

Summary: Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted...

Read MoreRead more about CVE-2021-32633
1280px-HK_Central_IFC_Mall_shop_logo_Apple_store_interior_stairs_Visitors_May-2012-e1622060284345-1024x614-1
  • News

Malware used zero-day exploit to take screenshots of victims’ Macs

May 27, 2021

An Apple Store in Hong Kong. (ChIfcapsho, CC BY-SA 3.0 https://creativecommons.org/licenses/by-sa/3.0, via Wikimedia Commons)Apple patched a vulnerability that was actively...

Read MoreRead more about Malware used zero-day exploit to take screenshots of victims’ Macs
osint
  • News

What is encryption? And why it matters in a VPN

May 27, 2021

Encryption is a term used to describe the methods that hide the true meaning of messages using code, especially to...

Read MoreRead more about What is encryption? And why it matters in a VPN
osint
  • News

How to delete your Twitter account: the deactivation process

May 27, 2021

You may decide to delete your Twitter account, because social media isn’t for everyone. Perhaps you set up an account...

Read MoreRead more about How to delete your Twitter account: the deactivation process
hacker-4703109_1280
  • News

Japan predicts hacker attack on Tokyo Summer Olympics by Russian hackers

May 27, 2021

According to Masatoshi Fujitani, head of the Tokyo-based Japan Forum for Strategic Studies (JFSS), the Summer Olympic Games in Tokyo...

Read MoreRead more about Japan predicts hacker attack on Tokyo Summer Olympics by Russian hackers

Posts pagination

Previous 1 … 3,820 3,821 3,822 3,823 3,824 3,825 3,826 … 4,075 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P5 – Reflected XSS on esto.nasa.gov allows arbitrary JavaScript execution and redirection – Faxcel

May 14, 2025
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P5 – an confidential pdf regarding technical memorandom – SahilGadhe

May 14, 2025
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P5 – Information Disclosure through configuration and various logs – yashjare

May 14, 2025
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P3 – Hardcoded API Key Found in Public NASA GitHub Repository – Uma_Maheshwar_Ayyala

May 14, 2025
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P5 – Stored XSS in NASA ASRS Maintenance Form – Payload Executes on Print Page – RootVaibhav

May 14, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel