Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2021-31170

May 14, 2021

Summary: Windows Graphics Component Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31188. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31170 https://www.zerodayinitiative.com/advisories/ZDI-21-578/...

Read MoreRead more about CVE-2021-31170
CVE-prog
  • Vulnerabilities

CVE-2021-1506

May 14, 2021

Summary: Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain...

Read MoreRead more about CVE-2021-1506
CVE-prog
  • Vulnerabilities

CVE-2016-4834

May 14, 2021

Summary: modules/Users/actions/Save.php in Vtiger CRM 6.4.0 and earlier does not properly restrict user-save actions, which allows remote authenticated users to...

Read MoreRead more about CVE-2016-4834
CVE-prog
  • Vulnerabilities

CVE-2021-31598

May 14, 2021

Summary: An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted...

Read MoreRead more about CVE-2021-31598
osint
  • News

WhatsApp calls and messages will break unless you share data with Facebook

May 14, 2021

WhatsApp told users last week that there was no need for alarm regarding an upcoming privacy policy deadline, as users...

Read MoreRead more about WhatsApp calls and messages will break unless you share data with Facebook
osint
  • News

What is a honeypot? How they are used in cybersecurity

May 14, 2021

Cybersecurity experts strive to enhance the security and privacy of computer systems. Quietly observing threat actors in action can help...

Read MoreRead more about What is a honeypot? How they are used in cybersecurity
png_
  • News

Newly observed PHP-based skimmer shows ongoing Magecart Group 12 activity

May 14, 2021

This blog post was authored by Jérôme Segura Web skimming continues to be a real and impactful threat to online...

Read MoreRead more about Newly observed PHP-based skimmer shows ongoing Magecart Group 12 activity
osint
  • News

What does WiFi stand for?

May 14, 2021

We use WiFi to connect to the Internet, but what is it, and what does it stand for? How does...

Read MoreRead more about What does WiFi stand for?
osint
  • News

Using iPhones and AirTags to sneak data out of air-gapped networks

May 14, 2021

Someone has found an extraordinary way to exfiltrate data by piggybacking data on the backs of unsuspecting iPhones. Say what?...

Read MoreRead more about Using iPhones and AirTags to sneak data out of air-gapped networks
hacker-4867349_1280
  • News

The White House believes that the attackers on the Colonial Pipeline are located in Russia

May 14, 2021

 The Russian authorities should take action against the hacker group DarkSide, which, according to Washington, is located in Russia and...

Read MoreRead more about The White House believes that the attackers on the Colonial Pipeline are located in Russia
sara-kurfess-B4ndBW2R_Q8-unsplash
  • News

Apple App Store Saved Users $1.5 Billion Worth in Fraud Transactions

May 14, 2021

 Tech giant Apple claimed that the measures taken to detect malicious apps and actions by developers on the App Store...

Read MoreRead more about Apple App Store Saved Users $1.5 Billion Worth in Fraud Transactions
google-chrome-1326908_1280
  • News

Fake Chrome App is Being Used as Part of a Cyberattack Campaign

May 14, 2021

 According to researchers at cybersecurity company Pradeo, a new Android malware has been discovered that imitates the Google Chrome software...

Read MoreRead more about Fake Chrome App is Being Used as Part of a Cyberattack Campaign
pexels-markus-spiske-10894382B252812529
  • News

Hackers Take Advantage of Adobe Zero-Day Vulnerability Impacting Acrobat Reader

May 14, 2021

 A patch for Adobe Acrobat, the world's most popular PDF reader, addresses a vulnerability that has been actively exploited and...

Read MoreRead more about Hackers Take Advantage of Adobe Zero-Day Vulnerability Impacting Acrobat Reader
pexels-anna-nekrashevich-6801872
  • News

167 Fake iOS & Android Trading Apps Brought to Light by Researchers

May 14, 2021

 Sophos, a worldwide leader in cybersecurity, has found 167 fake Android and iOS apps that criminals have been using to...

Read MoreRead more about 167 Fake iOS & Android Trading Apps Brought to Light by Researchers
3klCon_1_Welcome
  • Tools

3klCon – Automation Recon Tool Which Works With Large And Medium Scope

May 14, 2021

Full Automation Recon tool which works with Small and Medium scopes. ّIt's recommended to use it on VPS, it'll discover...

Read MoreRead more about 3klCon – Automation Recon Tool Which Works With Large And Medium Scope
snuffleupagus_1_sp
  • Tools

Snuffleupagus – Security Module For Php7 And Php8 – Killing Bugclasses And Virtual-Patching The Rest!

May 14, 2021

Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest! Snuffleupagus is a PHP 7+ and 8+...

Read MoreRead more about Snuffleupagus – Security Module For Php7 And Php8 – Killing Bugclasses And Virtual-Patching The Rest!
osint
  • News

Cisco fixes AnyConnect Client VPN zero-day disclosed in November

May 13, 2021

Cisco has addressed a zero-day in the Cisco AnyConnect Secure Mobility Client VPN software, with publicly available proof-of-concept exploit code....

Read MoreRead more about Cisco fixes AnyConnect Client VPN zero-day disclosed in November
osint
  • News

Biden signed executive order to improve the Nation’s Cybersecurity

May 13, 2021

President Joe Biden signed an ambitious executive order to dramatically improve the security of the US government networks. President Biden signed...

Read MoreRead more about Biden signed executive order to improve the Nation’s Cybersecurity
osint
  • News

US CISA and FBI publish joint alert on DarkSide ransomware

May 13, 2021

FBI and DHS’s CISA have published a joint alert on DarkSide ransomware activity after the disruptive attack on Colonial Pipeline....

Read MoreRead more about US CISA and FBI publish joint alert on DarkSide ransomware
osint
  • News

How Companies Need to Treat User Data and Manage Their Partners

May 13, 2021

After the introduction of CCPA and GDPR, much more attention is given to third-party risks, and the privacy terms and...

Read MoreRead more about How Companies Need to Treat User Data and Manage Their Partners
osint
  • News

Microsoft Patch Tuesday for May 2021 fix 4 critical flaws

May 13, 2021

Microsoft Patch Tuesday for May 2021 security updates addressed 55 vulnerabilities, four are rated as Critical. Microsoft Patch Tuesday for...

Read MoreRead more about Microsoft Patch Tuesday for May 2021 fix 4 critical flaws
CVE-prog
  • Vulnerabilities

CVE-2021-22209

May 13, 2021

Summary: An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating...

Read MoreRead more about CVE-2021-22209
CVE-prog
  • Vulnerabilities

CVE-2020-36126

May 13, 2021

Summary: Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation....

Read MoreRead more about CVE-2020-36126
CVE-prog
  • Vulnerabilities

CVE-2021-20986

May 13, 2021

Summary: A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This...

Read MoreRead more about CVE-2021-20986

Posts pagination

Previous 1 … 3,836 3,837 3,838 3,839 3,840 3,841 3,842 … 4,076 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[BLACKSUIT] – Ransomware Victim: Gloucester County Virginia

May 15, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]92[.]216[.]212:8080

May 15, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 193[.]124[.]41[.]54:80

May 15, 2025
brute_ratel_c4
  • Brute Ratel C4

Brute Ratel C4 Detected – 18[.]181[.]128[.]244:80

May 15, 2025
hkcert
  • HKCERT
  • News

Google Chrome Multiple Vulnerabilities

May 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel