Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols

June 2, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
pexels-luis-gomes-5468192B252842529
  • News

Cisco: Firewall Manager RCE Flaw is a Zero-day, Patch Arriving Soon

August 9, 2021

 In a Thursday security advisory update, Cisco disclosed that a remote code execution (RCE) vulnerability discovered last month in the...

Read MoreRead more about Cisco: Firewall Manager RCE Flaw is a Zero-day, Patch Arriving Soon
php-jpeg-injector_1-776367
  • Tools

Php-Jpeg-Injector – Injects Php Payloads Into Jpeg Images

August 9, 2021

Injects php payloads into jpeg images. Related to this post. Use CaseYou have a web application that runs a jpeg...

Read MoreRead more about Php-Jpeg-Injector – Injects Php Payloads Into Jpeg Images
image-25
  • Tools

Solitude – A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy Investigations

August 9, 2021

Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or...

Read MoreRead more about Solitude – A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy Investigations
osint
  • News

Security Affairs newsletter Round 326

August 8, 2021

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...

Read MoreRead more about Security Affairs newsletter Round 326
osint
  • News

A zero-day RCE in Cisco ADSM has yet to be fixed

August 8, 2021

A remote code execution (RCE) vulnerability in the Cisco Adaptive Security Device Manager (ADSM) Launcher disclosed in July has yet...

Read MoreRead more about A zero-day RCE in Cisco ADSM has yet to be fixed
osint
  • News

CVE-2021-20090 actively exploited to target millions of IoT devices worldwide

August 8, 2021

Threat actors are actively exploiting a critical authentication bypass issue (CVE-2021-20090) affecting home routers with Arcadyan firmware. Threat actors actively...

Read MoreRead more about CVE-2021-20090 actively exploited to target millions of IoT devices worldwide
CVE-prog
  • Vulnerabilities

CVE-2021-20228

August 8, 2021

Summary: A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is...

Read MoreRead more about CVE-2021-20228
CVE-prog
  • Vulnerabilities

CVE-2020-27153

August 8, 2021

Summary: In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker...

Read MoreRead more about CVE-2020-27153
CVE-prog
  • Vulnerabilities

CVE-2021-21775

August 8, 2021

Summary: A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A...

Read MoreRead more about CVE-2021-21775
CVE-prog
  • Vulnerabilities

CVE-2021-21779

August 8, 2021

Summary: A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web...

Read MoreRead more about CVE-2021-21779
CVE-prog
  • Vulnerabilities

CVE-2021-32791

August 8, 2021

Summary: mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party,...

Read MoreRead more about CVE-2021-32791
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

OrderSnapp – 1,304,447 breached accounts

August 8, 2021

In June 2020, the restaurant solutions provider OrderSnapp suffered a data breach which exposed 1.3M unique email addresses. Impacted data...

Read MoreRead more about OrderSnapp – 1,304,447 breached accounts
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

MMG Fusion – 2,660,295 breached accounts

August 8, 2021

In December 2020, the dental practice management service MMG Fusion was the victim of a data breach which exposed 2.6M...

Read MoreRead more about MMG Fusion – 2,660,295 breached accounts
osint
  • News

Telegram Bug in Mac Allows User To Save Secret Chats

August 8, 2021

 Cybersecurity experts have found a technique for Telegram users of Mac to keep self disappearing texts or view the messages...

Read MoreRead more about Telegram Bug in Mac Allows User To Save Secret Chats
osint
  • News

Detecting Cobalt Strike: Cybercrime Attacks

August 8, 2021

 One of the latest researches revealed that cybercriminals who employ malware often use the Cobalt Strike tool to release multiple...

Read MoreRead more about Detecting Cobalt Strike: Cybercrime Attacks
shahadat-rahman-BfrQnKBulYQ-unsplash-1
  • News

Several Critical Flaws Detected in Las Vegas’s Leading Casinos

August 8, 2021

 External attack surface management platform, Reposify, has discovered multiple vulnerabilities in the IT networks of Las Vegas’s leading casinos. Recently,...

Read MoreRead more about Several Critical Flaws Detected in Las Vegas’s Leading Casinos
pexels-omkar-patyane-211492
  • News

New DNS Flaw Enables ‘Nation-State Level Spying’ on Companies

August 8, 2021

 Researchers discovered a new category of DNS vulnerabilities hitting major DNS-as-a-Service (DNSaaS) providers, which may enable attackers to get access...

Read MoreRead more about New DNS Flaw Enables ‘Nation-State Level Spying’ on Companies
programming-1873854_1920
  • News

Inadequate Payment Leads the Affiliate to Leak the Ransomware Gang’s Technical Manual

August 8, 2021

 A frustrated Conti affiliate revealed the gang's training material during attacks and released details on one of the administrators of...

Read MoreRead more about Inadequate Payment Leads the Affiliate to Leak the Ransomware Gang’s Technical Manual
Go-Shellcode
  • Tools

Go-Shellcode – A Repository Of Windows Shellcode Runners And Supporting Utilities

August 8, 2021

go-shellcode is a repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API...

Read MoreRead more about Go-Shellcode – A Repository Of Windows Shellcode Runners And Supporting Utilities
image-24
  • Tools

cThreadHijack – Beacon Object File (BOF) For Remote Process Injection Via Thread Hijacking

August 8, 2021

___________.__ .______ ___ .__ __ __ _____ ___/| |_________ ____ _____ __| _/ | |__| |__|____ ____ | | ___/...

Read MoreRead more about cThreadHijack – Beacon Object File (BOF) For Remote Process Injection Via Thread Hijacking
Screenshot
  • Tools

NordLynx WireGuard Config Extraction Script

August 7, 2021

A Simple bash script to extract the NordLynx Wireguard config information that is needed to use wireguard and nord outside...

Read MoreRead more about NordLynx WireGuard Config Extraction Script
osint
  • News

RansomEXX ransomware hit computer manufacturer and distributor GIGABYTE

August 7, 2021

Taiwanese manufacturer and distributor of computer hardware GIGABYTE was a victim of the RansomEXX ransomware gang. RansomEXX ransomware gang hit...

Read MoreRead more about RansomEXX ransomware hit computer manufacturer and distributor GIGABYTE
osint
  • News

RansomEXX ransomware leaks files stolen from Italian luxury brand Zegna

August 7, 2021

RansomEXX ransomware operators hit the popular Italian luxury fashion house Ermenegildo Zegna Holding and started leaking stolen files. Zegna is one of...

Read MoreRead more about RansomEXX ransomware leaks files stolen from Italian luxury brand Zegna
osint
  • News

Ivanti fixed a critical code execution issue in Pulse Connect Secure VPN

August 7, 2021

Security firm Ivanti addressed a critical vulnerability in its Pulse Connect Secure VPN appliances that could be exploited to execute...

Read MoreRead more about Ivanti fixed a critical code execution issue in Pulse Connect Secure VPN

Posts pagination

Previous 1 … 3,838 3,839 3,840 3,841 3,842 3,843 3,844 … 4,148 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-26691

June 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-35005

June 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-35004

June 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5847

June 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-32455

June 9, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel