Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
pexels-negative-space-34577
  • News

Amazon Fake Reviews Scam Exposed in Data Breach

May 10, 2021

The identities of over 200,000 people who appear to be participating in Amazon fraudulent product review schemes have been exposed...

Read MoreRead more about Amazon Fake Reviews Scam Exposed in Data Breach
apple-3595603_1280
  • News

A Russian specialist warned of the deadly dangers of the smartphone

May 10, 2021

 The most frequently smartphones of the company Samsung are exploded. There are also known cases when Apple products exploded in...

Read MoreRead more about A Russian specialist warned of the deadly dangers of the smartphone
pexels-sawyer-sutton-973049
  • News

SolarWinds Hack Alarms US Spy Agencies to Inspect Software Suppliers’ Ties with Russia

May 10, 2021

 US intelligence agencies have started to study supply chain threats from Russia, a top official within the Justice Department confirmed...

Read MoreRead more about SolarWinds Hack Alarms US Spy Agencies to Inspect Software Suppliers’ Ties with Russia
Lucifer_16_one
  • Tools

Lucifer – A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More…

May 10, 2021

A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build...

Read MoreRead more about Lucifer – A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More…
go_hack
  • Tools

Waybackurls – Fetch All The URLs That The Wayback Machine Knows About For A Domain

May 10, 2021

Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for *.domain and output them on stdout. Usage...

Read MoreRead more about Waybackurls – Fetch All The URLs That The Wayback Machine Knows About For A Domain
osint
  • News

SQL injection issue in Anti-Spam WordPress Plugin exposes User Data

May 9, 2021

‘Spam protection, AntiSpam, FireWall by CleanTalk’ anti-spam WordPress plugin could expose user sensitive data to an unauthenticated attacker. A Time-Based...

Read MoreRead more about SQL injection issue in Anti-Spam WordPress Plugin exposes User Data
osint
  • News

Security Affairs newsletter Round 313

May 9, 2021

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...

Read MoreRead more about Security Affairs newsletter Round 313
osint
  • News

TsuNAME flaw exposes DNS servers to DDoS attacks

May 9, 2021

A flaw in some DNS resolvers, tracked as TsuNAME, can allow attackers to launch DDoS attacks against authoritative DNS servers....

Read MoreRead more about TsuNAME flaw exposes DNS servers to DDoS attacks
osint
  • News

A cyberattack shutdown US Colonial Pipeline

May 9, 2021

A cyberattack forced the shutdown of one of the largest pipelines in the United States, the Colonial Pipeline facility in...

Read MoreRead more about A cyberattack shutdown US Colonial Pipeline
CVE-prog
  • Vulnerabilities

CVE-2021-1501

May 9, 2021

Summary: A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense...

Read MoreRead more about CVE-2021-1501
CVE-prog
  • Vulnerabilities

CVE-2021-1493

May 9, 2021

Summary: A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense...

Read MoreRead more about CVE-2021-1493
CVE-prog
  • Vulnerabilities

CVE-2021-31919

May 9, 2021

Summary: An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization,...

Read MoreRead more about CVE-2021-31919
CVE-prog
  • Vulnerabilities

CVE-2020-7731

May 9, 2021

Summary: This affects all versions of package github.com/russellhaering/gosaml2. There is a crash on nil-pointer dereference caused by sending malformed XML...

Read MoreRead more about CVE-2020-7731
spdiey2Bbot
  • News

Ransomware Hits US Defense Contractor BlueForce

May 9, 2021

A ransomware attack hit U.S defense contractor Blueforce, says Hatching Triage sample, and a Conti ransomware chat. Ransomware in the...

Read MoreRead more about Ransomware Hits US Defense Contractor BlueForce
iphone-410311_1280
  • News

An Award-Winning iPhone Hack Used by China to Spy on Uyghur Muslims

May 9, 2021

 According to a recent article, the Chinese government used an award-winning iPhone hack first uncovered three years ago at a...

Read MoreRead more about An Award-Winning iPhone Hack Used by China to Spy on Uyghur Muslims
pexels-christina-morillo-1181675
  • News

Threat Actors Use Several New Advanced Techniques To Exploit Windows Services

May 9, 2021

 According to the cybersecurity researchers, several fresh techniques, comparatively advanced — are being used by attackers, for exploiting legitimate Windows...

Read MoreRead more about Threat Actors Use Several New Advanced Techniques To Exploit Windows Services
pexels-nataliya-vaitkevich-5863389
  • News

Workings of US Firms Disturbed Due to Covid Surge in Banglore

May 9, 2021

 To say that Bengaluru’s epidemic is huge is an understatement. Bengaluru has more than 65 percent of all active cases...

Read MoreRead more about Workings of US Firms Disturbed Due to Covid Surge in Banglore
cyber-security-3194286_1280
  • News

TsuNAME: New DNS Bug could be used to DDoS Authoritative DNS Servers

May 9, 2021

Security researchers have found extreme domain name system (DNS) fixes that hackers may use to conduct constructive denial-of-service attacks on...

Read MoreRead more about TsuNAME: New DNS Bug could be used to DDoS Authoritative DNS Servers
kiterunner_1_kiterunner
  • Tools

Kiterunner – Contextual Content Discovery Tool

May 9, 2021

For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective...

Read MoreRead more about Kiterunner – Contextual Content Discovery Tool
red-detector_1_red-detector
  • Tools

Red-Detector – Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io

May 9, 2021

Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance to find security misconfigurations using...

Read MoreRead more about Red-Detector – Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io
osint
  • News

Microsoft warns of a large-scale BEC campaign to make gift card scam

May 8, 2021

Microsoft is warning of a large-scale BEC campaign that targeted hundreds of organizations leveraging typo-squatted domains registered days before the...

Read MoreRead more about Microsoft warns of a large-scale BEC campaign to make gift card scam
osint
  • News

Russia-linked APT29 group changes TTPs following April advisories

May 8, 2021

The UK and US cybersecurity agencies have published a report detailing techniques used by Russia-linked cyberespionage group known APT29 (aka...

Read MoreRead more about Russia-linked APT29 group changes TTPs following April advisories
CVE-prog
  • Vulnerabilities

CVE-2021-25147

May 8, 2021

Summary: A remote authentication restriction bypass vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has...

Read MoreRead more about CVE-2021-25147
CVE-prog
  • Vulnerabilities

CVE-2021-21414

May 8, 2021

Summary: Prisma is an open source ORM for Node.js & TypeScript. As of today, we are not aware of any...

Read MoreRead more about CVE-2021-21414

Posts pagination

Previous 1 … 3,841 3,842 3,843 3,844 3,845 3,846 3,847 … 4,077 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:2222

May 16, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: olympusaero[.]com

May 16, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: azpiaran[.]com

May 15, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: wnyenergy[.]com

May 15, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: ITinSell group

May 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel