Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols

June 2, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
jackpotting
  • News

This Vulnerability in E-Learning Platform Moodle Could Even Modify Exam Results

August 3, 2021

 Critical Security Exploit in the popular e learning platform Moodle can be compromised that lets access to student data and...

Read MoreRead more about This Vulnerability in E-Learning Platform Moodle Could Even Modify Exam Results
pexels-tima-miroshnichenko-5380641
  • News

City Officials of Grass Valley Negotiates with the Handlers of Ransomware Attack

August 3, 2021

 The city of Grass Valley is one of the latest victims of a ransomware attack. The operators of the ransomware...

Read MoreRead more about City Officials of Grass Valley Negotiates with the Handlers of Ransomware Attack
code-1839406_1920
  • News

Malevolent PyPI Packages Detected Filching Developer Data

August 3, 2021

 Repositories of software packages have become a frequent target for supply chain attacks. Reports concerning malware attacks on prominent repository...

Read MoreRead more about Malevolent PyPI Packages Detected Filching Developer Data
pexels-photomix-company-218717
  • News

Google Plans to Ban ‘Sugar Dating’ Apps From September

August 3, 2021

 Google is all set to remove ‘Super Dating' applications from the Play Store in order to make the Android app...

Read MoreRead more about Google Plans to Ban ‘Sugar Dating’ Apps From September
hacker-2883632_1920
  • News

Security Researchers Discovered Crimea Manifesto Buried in VBA Rat

August 3, 2021

 On Thursday, Hossein Jazi and the Threat Intelligence team at Malwarebytes released a report revealing a new threat actor that...

Read MoreRead more about Security Researchers Discovered Crimea Manifesto Buried in VBA Rat
domhttpx_7_default-usage-784594
  • Tools

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can Make It Easier For You To Find Many URLs/IPs At Once With Fast Time

August 3, 2021

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to...

Read MoreRead more about Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can Make It Easier For You To Find Many URLs/IPs At Once With Fast Time
PowerShellArmoury_1-793052
  • Tools

PowerShellArmoury – A PowerShell Armoury For Security Guys And Girls

August 3, 2021

The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their...

Read MoreRead more about PowerShellArmoury – A PowerShell Armoury For Security Guys And Girls
osint
  • News

More evidence suggests that DarkSide and BlackMatter are the same group

August 2, 2021

Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. BleepingComputer found evidence that...

Read MoreRead more about More evidence suggests that DarkSide and BlackMatter are the same group
osint
  • News

WordPress Download Manager Plugin was affected by two flaws

August 2, 2021

An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under...

Read MoreRead more about WordPress Download Manager Plugin was affected by two flaws
osint
  • News

Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14

August 2, 2021

The 2021 attacks on two water treatment facilities in the US—combined with ransomware attacks on an oil and gas supplier...

Read MoreRead more about Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14
osint
  • News

Ransomware Attempt Volume Touching Over 300 Million, Sets Record

August 2, 2021

A new investigation report has been published by SonicWall network security organization in which it stated that ransomware attacks have...

Read MoreRead more about Ransomware Attempt Volume Touching Over 300 Million, Sets Record
iphone2B5
  • News

Hacker Uses Credential Phishing to Gain Access Into PayPal Account

August 2, 2021

 Analysts from Cofense Phishing Defense Center recently found a unique PayPal credential phishing attack. Phishing is a harmful technique that...

Read MoreRead more about Hacker Uses Credential Phishing to Gain Access Into PayPal Account
adi-goldstein-EUsVwEOsblE-unsplash
  • News

Exploit Code Released for a Critical Flaw in Linux Kernel eBPF on Ubuntu Machines

August 2, 2021

 Cybersecurity researcher Manfred Paul revealed the details of the code for abusing a critical flaw in the Linux eBPF (Extended...

Read MoreRead more about Exploit Code Released for a Critical Flaw in Linux Kernel eBPF on Ubuntu Machines
malicious-code-4036349_1920
  • News

Russia’s APT29 is Actively Serving WellMess/WellMail Malware

August 2, 2021

 A year ago, the United Kingdom, the USA, and Canada released a coordinated advisory, during the global pandemic, revealing a...

Read MoreRead more about Russia’s APT29 is Actively Serving WellMess/WellMail Malware
pexels-sora-shimazaki-59357942B252822529
  • News

Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings

August 2, 2021

 President Joe Biden's appeal for Vladimir Putin to crack down on cyberattacks emanating from within Russia appears to have failed...

Read MoreRead more about Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings
tsharkVM_1_tshark_vm_dashboard-726339
  • Tools

tsharkVM – Tshark + ELK Analytics Virtual Machine

August 2, 2021

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance...

Read MoreRead more about tsharkVM – Tshark + ELK Analytics Virtual Machine
Disk2BForensics
  • Tools

CSIRT-Collect – PowerShell Script To Collect Memory And (Triage) Disk Forensics

August 2, 2021

A PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a network share,...

Read MoreRead more about CSIRT-Collect – PowerShell Script To Collect Memory And (Triage) Disk Forensics
osint
  • News

GhostEmperor, a new Chinese-speaking threat actor targets Southeast Asia

August 1, 2021

Kaspersky experts spotted a previously undocumented Chinese-speaking threat actor, tracked as GhostEmperor, that is targeting Microsoft Exchange flaws in attacks...

Read MoreRead more about GhostEmperor, a new Chinese-speaking threat actor targets Southeast Asia
osint
  • News

Security Affairs newsletter Round 325

August 1, 2021

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...

Read MoreRead more about Security Affairs newsletter Round 325
osint
  • News

Threat actors leaked data stolen from EA, including FIFA code

August 1, 2021

Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure...

Read MoreRead more about Threat actors leaked data stolen from EA, including FIFA code
osint
  • News

SolarWinds hackers breached 27 state attorneys’ offices

August 1, 2021

Microsoft Office 365 email accounts of employees at 27 US Attorneys’ offices were breached by the Russia-linked SVR group as part of...

Read MoreRead more about SolarWinds hackers breached 27 state attorneys’ offices
CVE-prog
  • Vulnerabilities

CVE-2018-20346

August 1, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20346
CVE-prog
  • Vulnerabilities

CVE-2018-20346

August 1, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20346
CVE-prog
  • Vulnerabilities

CVE-2018-20346

August 1, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20346

Posts pagination

Previous 1 … 3,842 3,843 3,844 3,845 3,846 3,847 3,848 … 4,147 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

6b611cd5a931b5949c1139f0e0f3d9bf46ca5db43f7bac0f0fe051b0984d0bd0
  • News

Musk And Trump Take Slap Fight Public As Bromance Ends

June 9, 2025
2ecee3701da63c64b412bbf675b90db3d6453bf6ad9b4dcbbf155aa50cf69505
  • News

As Europe Eyes Move From Us Hyperscalers, Ionos Dismisses Scaleability Worries

June 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-35010

June 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-35009

June 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3459

June 9, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel