Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols

June 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
1f1e8-1f1f3-1
  • News

Attackers are attempting to exploit recently patched Atlassian Confluence CVE-2021-26084 RCE

September 2, 2021

Threat actors are actively exploiting a recently patched vulnerability in Atlassian’s Confluence enterprise collaboration product. Threat actors were spotted exploiting...

Read MoreRead more about Attackers are attempting to exploit recently patched Atlassian Confluence CVE-2021-26084 RCE
osint
  • News

Cyber Defense Magazine – September 2021 has arrived. Enjoy it!

September 2, 2021

Cyber Defense Magazine September 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with 161 pages of excellent...

Read MoreRead more about Cyber Defense Magazine – September 2021 has arrived. Enjoy it!
osint
  • News

Cisco fixes a critical flaw in Enterprise NFVIS for which PoC exploit exists

September 2, 2021

Cisco released patches for a critical authentication bypass issue in Enterprise NFV Infrastructure Software (NFVIS) for which PoC exploit code...

Read MoreRead more about Cisco fixes a critical flaw in Enterprise NFVIS for which PoC exploit exists
osint
  • News

Google paid over $130K in bounty rewards for the issues addressed with the release of Chrome 93

September 2, 2021

Google announced the release of Chrome 93 that addresses 27 security vulnerabilities, 19 issues were reported through its bug bounty...

Read MoreRead more about Google paid over $130K in bounty rewards for the issues addressed with the release of Chrome 93
osint
  • News

Mozi infections will slightly decrease but it will stay alive for some time to come

September 2, 2021

The Mozi botnet continues to spread despite the arrest of its alleged author and experts believe that it will run...

Read MoreRead more about Mozi infections will slightly decrease but it will stay alive for some time to come
osint
  • News

QNAP will patche OpenSSL flaws in its NAS devices

September 2, 2021

Network-attached storage (NAS) appliance maker QNAP is working on security patches for its products affected by recently fixed OpenSSL flaws. Taiwanese...

Read MoreRead more about QNAP will patche OpenSSL flaws in its NAS devices
CVE-prog
  • Vulnerabilities

CVE-2021-3682

September 2, 2021

Summary: A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs...

Read MoreRead more about CVE-2021-3682
CVE-prog
  • Vulnerabilities

CVE-2021-1523

September 2, 2021

Summary: A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated,...

Read MoreRead more about CVE-2021-1523
CVE-prog
  • Vulnerabilities

CVE-2021-1523

September 2, 2021

Summary: A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated,...

Read MoreRead more about CVE-2021-1523
CVE-prog
  • Vulnerabilities

CVE-2021-24580

September 2, 2021

Summary: The Side Menu Lite WordPress plugin before 2.2.6 does not sanitise user input from the List page in the...

Read MoreRead more about CVE-2021-24580
CVE-prog
  • Vulnerabilities

CVE-2021-38714

September 2, 2021

Summary: In Plib through 1.85, there is an integer overflow vulnerability that could result in arbitrary code execution. The vulnerability...

Read MoreRead more about CVE-2021-38714
CVE-prog
  • Vulnerabilities

CVE-2017-16875

September 2, 2021

Summary: An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. The ioqueue component may issue...

Read MoreRead more about CVE-2017-16875
osint
  • News

FTC bans SpyFone and its CEO from continuing to sell stalkerware

September 2, 2021

Nearly two years after the US Federal Trade Commission first took aim against mobile apps that can non-consensually track people’s...

Read MoreRead more about FTC bans SpyFone and its CEO from continuing to sell stalkerware
PlayStore-600x83-1
  • News

Google Play sign-ins can be abused to track another person’s movements

September 2, 2021

Even people that have been involved in cybersecurity for over 20 years make mistakes. I’m not sure whether that is...

Read MoreRead more about Google Play sign-ins can be abused to track another person’s movements
ReceiverHelper-will-damage-your-computer
  • News

Macs turn on apps signed by Symantec, treat them as malware

September 2, 2021

On August 23, following an update to Apple’s XProtect system—one of the security features built into macOS—some Mac users began...

Read MoreRead more about Macs turn on apps signed by Symantec, treat them as malware
android-4412596_1280
  • News

Kaspersky Lab has reported about Android viruses designed to steal money automatically

September 2, 2021

Viktor Chebyshev, a leading researcher of mobile threats at Kaspersky Lab, spoke in an interview with Russian newspaper Izvestia about...

Read MoreRead more about Kaspersky Lab has reported about Android viruses designed to steal money automatically
anonymous-studio-figure-photography-facial-mask-38275
  • News

Experts Find Vulnerabilities in AMD Zen Processor

September 2, 2021

 German cybersecurity experts at TU Dresden discovered that Zen processor of AMD is susceptible to data-bothering meltdown like attacks in...

Read MoreRead more about Experts Find Vulnerabilities in AMD Zen Processor
pexels-tima-miroshnichenko-5380641
  • News

Do Not Use Single-Factor Authentication on Internet-Exposed Systems, CISA Warns

September 2, 2021

 The US Cybersecurity and Infrastructure Security Agency (CISA) this week added single-factor authentication (SFA) to a very short list of...

Read MoreRead more about Do Not Use Single-Factor Authentication on Internet-Exposed Systems, CISA Warns
contact-us-2993000_1920
  • News

Credential Phishing and Brute Force Attacks Continue to Surge

September 2, 2021

Financial and reputational aspects of organizations across the globe are taking a severe hit as they witness advanced email threats...

Read MoreRead more about Credential Phishing and Brute Force Attacks Continue to Surge
id-4157974_1920
  • News

Driver’s License Exploitation Scams Surge

September 2, 2021

 The Covid epidemic has provided a ripe opportunity for cybercriminals, who are taking advantage of internet information from outdated driver's...

Read MoreRead more about Driver’s License Exploitation Scams Surge
blm_logo
  • Data Breach
  • Ransomware

BlackMatter Ransomware Victim: Trust Capital Funding

September 2, 2021

BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...

Read MoreRead more about BlackMatter Ransomware Victim: Trust Capital Funding
avos
  • Data Breach
  • Ransomware

AVOS Locker Ransomware Victim: Potter Concrete

September 2, 2021

AvosLocker Ransomware SummaryVictim Name: Potter ConcretePotter Concrete suffered a breach and this is a sample of the files we've downloaded...

Read MoreRead more about AVOS Locker Ransomware Victim: Potter Concrete
403bypasser_3_banner_v2-758854
  • Tools

403Bypasser – Automates The Techniques Used To Circumvent Access Control Restrictions On Target Pages

September 2, 2021

403bypasser automates the techniques used to circumvent access control restrictions on target pages. 403bypasser will continue to be improved and...

Read MoreRead more about 403Bypasser – Automates The Techniques Used To Circumvent Access Control Restrictions On Target Pages
SigFlip
  • Tools

SigFlip – A Tool For Patching Authenticode Signed PE Files (Exe, Dll, Sys ..Etc) Without Invalidating Or Breaking The Existing Signature

September 2, 2021

SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) in a way that doesn't affect...

Read MoreRead more about SigFlip – A Tool For Patching Authenticode Signed PE Files (Exe, Dll, Sys ..Etc) Without Invalidating Or Breaking The Existing Signature

Posts pagination

Previous 1 … 3,821 3,822 3,823 3,824 3,825 3,826 3,827 … 4,158 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: www[.]waveny[.]org

June 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6002

June 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22874

June 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-40915

June 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6001

June 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel