Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols

June 2, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025
unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2015-5349

July 24, 2021

Summary: The CSV export in Apache LDAP Studio and Apache Directory Studio before 2.0.0-M10 does not properly escape field values,...

Read MoreRead more about CVE-2015-5349
advert-1
  • News

AvosLocker enters the ransomware scene, asks for partners

July 24, 2021

This blog post was authored by Hasherezade In mid-July we responded to an incident that involved an attack on a...

Read MoreRead more about AvosLocker enters the ransomware scene, asks for partners
osint
  • News

CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack

July 24, 2021

Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group...

Read MoreRead more about CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack
osint
  • News

Busted! Fraud-as-a-Service gang that sold 2FA-proof phishing arrested

July 24, 2021

The Dutch police announced that they arrested two Dutch citizens, aged 24 and 15, for developing and selling phishing panels....

Read MoreRead more about Busted! Fraud-as-a-Service gang that sold 2FA-proof phishing arrested
binary-6475780_1280
  • News

The work of the Runet was tested in the exercise of disconnection from the global network

July 24, 2021

 In June—July, regular exercises on the stability of the Runet were held. This time the possibility of working in conditions...

Read MoreRead more about The work of the Runet was tested in the exercise of disconnection from the global network
sai-kiran-anagani-5Ntkpxqt54Y-unsplash-3
  • News

Global Outage Disrupts the Services of Major Websites

July 24, 2021

 Several major websites faced outages on Thursday due to a glitch in Akamai Technologies Inc's (AKAM.O) systems, the second widespread...

Read MoreRead more about Global Outage Disrupts the Services of Major Websites
pexels-polina-zimmerman-3747139
  • News

New Windows and Linux Flaws: Provide Attackers Highest System Privileges

July 24, 2021

 Two new vulnerabilities, one in Windows and the other in Linux, were discovered on Tuesday, allowing hackers with a presence...

Read MoreRead more about New Windows and Linux Flaws: Provide Attackers Highest System Privileges
petter-lagson-z-upQITw4fY-unsplash2B252812529
  • News

Pulse Security Devices Identified with Malware: Alerts CISA

July 24, 2021

 A detailed warning concerning almost 13 malware samples associated with Pulse Secure operated devices has been issued by the Cybersecurity...

Read MoreRead more about Pulse Security Devices Identified with Malware: Alerts CISA
olympic-games-1608127_1280
  • News

Olympic Ticket Data Leaked, Says Japanese Government

July 24, 2021

 Following a breach, user IDs and passwords for the Tokyo Olympic ticket gateway were released on a leak website, a...

Read MoreRead more about Olympic Ticket Data Leaked, Says Japanese Government
logo_transparent
  • Tools

In0ri – Defacement Detection With Deep Learning

July 24, 2021

In0ri is a defacement detection system utilizing a image-classification convolutional neural network. IntroductionWhen monitoring a website, In0ri will periodically take...

Read MoreRead more about In0ri – Defacement Detection With Deep Learning
TeamsUserEnum_1_enumeration-users
  • Tools

TeamsUserEnum – User Enumeration With Microsoft Teams API

July 24, 2021

Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...

Read MoreRead more about TeamsUserEnum – User Enumeration With Microsoft Teams API
CVE-prog
  • Vulnerabilities

CVE-2020-28010

July 23, 2021

Summary: Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory...

Read MoreRead more about CVE-2020-28010
CVE-prog
  • Vulnerabilities

CVE-2021-3518

July 23, 2021

Summary: There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file...

Read MoreRead more about CVE-2021-3518
CVE-prog
  • Vulnerabilities

CVE-2019-17543

July 23, 2021

Summary: LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with...

Read MoreRead more about CVE-2019-17543
CVE-prog
  • Vulnerabilities

CVE-2021-22884

July 23, 2021

Summary: Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When...

Read MoreRead more about CVE-2021-22884
CVE-prog
  • Vulnerabilities

CVE-2021-22901

July 23, 2021

Summary: curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS...

Read MoreRead more about CVE-2021-22901
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Audi – 2,743,539 breached accounts

July 23, 2021

In August 2019, Audio USA suffered a data breach after a vendor left data unsecured and exposed on the internet....

Read MoreRead more about Audi – 2,743,539 breached accounts
osint
  • News

5 years for swatter who caused a man’s death for a Twitter handle

July 23, 2021

Doxing (or doxxing) is in the news again, for an absolutely shocking story that ended with a man’s death caused...

Read MoreRead more about 5 years for swatter who caused a man’s death for a Twitter handle
download-update-600x149-1
  • News

Millions of Windows machines affected by ancient printer vulnerability

July 23, 2021

A very serious security flaw in immensely popular printer drivers has been disclosed and it could affect many millions of...

Read MoreRead more about Millions of Windows machines affected by ancient printer vulnerability
osint
  • News

Pegasus spyware has been here for years. We must stop ignoring it

July 23, 2021

On July 18, a group of 17 newspaper and media organizations—aided by Amnesty International’s Security Lab and the research group...

Read MoreRead more about Pegasus spyware has been here for years. We must stop ignoring it
pietro-jeng-n6B49lTx7NM-unsplash-3
  • News

Swedish Crypto Scammer Jailed for 15 Years in Gold-Backed Fraud

July 23, 2021

 A citizen of Sweden was sentenced to 15 years in prison for manipulating a cryptocurrency scam claiming to pay investors...

Read MoreRead more about Swedish Crypto Scammer Jailed for 15 Years in Gold-Backed Fraud
sina-drakhshani-YqaprnuJjSM-unsplash
  • News

Cyber-Attack by Hackers Disrupt Iranian Railway System

July 23, 2021

 On Saturday 10th of July, just after a cyber interruption in IRNA's computing devices, the official IRNA media outlet announced...

Read MoreRead more about Cyber-Attack by Hackers Disrupt Iranian Railway System
pexels-castorly-stock-4114774
  • News

Safeguard Your Smartphones From Radio-based Attacks

July 23, 2021

 Smartphones, unlike PCs, involve a range of radios – generally cellular, Wi-Fi, Bluetooth, and Near Field Communication (NFC) – that...

Read MoreRead more about Safeguard Your Smartphones From Radio-based Attacks
cyber-security-3400657_1920
  • News

Pegasus: The Case of the Infamous Spyware

July 23, 2021

 The case of the infamous spyware Pegasus has taken the world by storm, with news revealing its unlawful use infringing...

Read MoreRead more about Pegasus: The Case of the Infamous Spyware

Posts pagination

Previous 1 … 3,847 3,848 3,849 3,850 3,851 3,852 3,853 … 4,146 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: idor-vulnerability-at-addtagtoassets-operation-name-root-geek

June 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5814

June 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5303

June 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47601

June 8, 2025
cybercrime
  • News

Linux Foundation Tries To Play Peacemaker In Ongoing WordPress Scuffle

June 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel