Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols

June 2, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025
unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
h
  • Tools

Pstf2 – Passive Security Tools Fingerprinting Framework

July 23, 2021

Have you ever wanted a simple, easy and stealth bypass for multiple classes of security products? pstf^2 (pronounced pstf-square) is...

Read MoreRead more about Pstf2 – Passive Security Tools Fingerprinting Framework
beanshooter_3_01-demo-737802
  • Tools

Beanshooter – JMX Enumeration And Attacking Tool

July 23, 2021

Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.IntroductionJMX stands for...

Read MoreRead more about Beanshooter – JMX Enumeration And Attacking Tool
osint
  • News

Group-IB helps Dutch police identify members of phishing developer gang Fraud Family

July 22, 2021

Researchers from threat intelligence firm Group-IB helps Dutch police identify members of phishing developer gang known as Fraud Family. Group-IB,...

Read MoreRead more about Group-IB helps Dutch police identify members of phishing developer gang Fraud Family
osint
  • News

CISA analyzed stealthy malware found on compromised Pulse Secure devices

July 22, 2021

U.S. CISA released an alert today about several stealth malware samples that were found on compromised Pulse Secure devices. The...

Read MoreRead more about CISA analyzed stealthy malware found on compromised Pulse Secure devices
osint
  • News

TicketClub Italy Database Offered in Dark Web

July 22, 2021

A database belonging to TicketClub Italy, a company providing coupons platform for offline purchases, is available for sale on darkweb...

Read MoreRead more about TicketClub Italy Database Offered in Dark Web
osint
  • News

Thousands of Humana customers have their medical data leaked online by threat actors

July 22, 2021

Experts found a DB containing sensitive health insurance data belonging to customers of US insurance giant Humana. An SQL database...

Read MoreRead more about Thousands of Humana customers have their medical data leaked online by threat actors
osint
  • News

France ANSSI agency warns of APT31 campaign against French organizations

July 22, 2021

French cyber-security agency ANSSI warned of an ongoing cyberespionage campaign aimed at French organizations carried out by China-linked APT31 group....

Read MoreRead more about France ANSSI agency warns of APT31 campaign against French organizations
CVE-prog
  • Vulnerabilities

CVE-2021-34521

July 22, 2021

Summary: Raw Image Extension Remote Code Execution Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34521 CVSS Score (if available) v2: / MEDIUM v3:...

Read MoreRead more about CVE-2021-34521
CVE-prog
  • Vulnerabilities

CVE-2021-34522

July 22, 2021

Summary: Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34464. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34522 CVSS Score...

Read MoreRead more about CVE-2021-34522
CVE-prog
  • Vulnerabilities

CVE-2021-34525

July 22, 2021

Summary: Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33754, CVE-2021-33780, CVE-2021-34494. Reference Links(if...

Read MoreRead more about CVE-2021-34525
CVE-prog
  • Vulnerabilities

CVE-2021-34529

July 22, 2021

Summary: Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34528. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34529 https://www.zerodayinitiative.com/advisories/ZDI-21-827/...

Read MoreRead more about CVE-2021-34529
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Guntrader – 112,031 breached accounts

July 22, 2021

In July 2021, the United Kingdom based website Guntrader suffered a data breach that exposed 112k unique email addresses. Extensive...

Read MoreRead more about Guntrader – 112,031 breached accounts
zeus-cyber-theft-ring
  • News

The life and death of the ZeuS Trojan

July 22, 2021

Whether you’ve read up on Greek mythology or you’re simply a big fan of Marvel comics, the name “Zeus” should...

Read MoreRead more about The life and death of the ZeuS Trojan
osint
  • News

ID theft ghouls targeting Surfside victims is appalling, but no surprise

July 22, 2021

We’ve written at length about account compromise and identity theft, and how criminals will often hijack accounts belonging to dead...

Read MoreRead more about ID theft ghouls targeting Surfside victims is appalling, but no surprise
osint
  • News

HiveNightmare zero-day lets anyone be SYSTEM on Windows 10 and 11

July 22, 2021

Users with low privileges can access sensitive Registry database files on Windows 10 and Windows 11, leaving them vulnerable to...

Read MoreRead more about HiveNightmare zero-day lets anyone be SYSTEM on Windows 10 and 11
hands-1851218_1280
  • News

Telegram Pavel Durov says that since 2018 he knew about the potential surveillance of his phone

July 22, 2021

The billionaire said he had known since 2018 that one of his phone numbers was on the NSO Group list,...

Read MoreRead more about Telegram Pavel Durov says that since 2018 he knew about the potential surveillance of his phone
pexels-tima-miroshnichenko-5380641-3
  • News

Heartless Attackers Stole Identities of Surfside Condo Collapse Victims

July 22, 2021

 Threat actors are targeting people who died in the June 24 collapse of Champlain Towers South in Surfside by ransacking...

Read MoreRead more about Heartless Attackers Stole Identities of Surfside Condo Collapse Victims
pexels-max-deroin-514152B252812529
  • News

This New Malware Hides Itself Among Windows Defender Exclusions to Avoid Detection

July 22, 2021

 On Tuesday, security experts confirmed the existence of a previously undocumented malware strain named "MosaicLoader," which targets people looking for...

Read MoreRead more about This New Malware Hides Itself Among Windows Defender Exclusions to Avoid Detection
binary-797274_1920
  • News

Caliente Bandits Target Spanish Speaking Individuals to Spread Bandook Malware

July 22, 2021

 A new hacking gang TA2721 also commonly known as Caliente Bandits has been tracked by Proofpoint researchers since January 2021....

Read MoreRead more about Caliente Bandits Target Spanish Speaking Individuals to Spread Bandook Malware
iphone-410311_1280
  • News

Apple’s iPhone is the Easiest to Snoop on Using the Pegasus, Says Amnesty

July 22, 2021

 NSO Group, an Israeli cyber intelligence firm, developed Pegasus spyware as a surveillance tool. As claimed by the corporation, this...

Read MoreRead more about Apple’s iPhone is the Easiest to Snoop on Using the Pegasus, Says Amnesty
abstract-city-990x400-1
  • News

Managed Detection and Response in Q4 2020

July 22, 2021

 Download full report (PDF) As cyberattacks become more sophisticated, and security solutions require more resources to analyze the huge amount...

Read MoreRead more about Managed Detection and Response in Q4 2020
Hash-Buster_4-730187
  • Tools

Hash-Buster v3.0 – Crack Hashes In Seconds

July 22, 2021

Why crack hashes when you can bust them?FeaturesAutomatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract &...

Read MoreRead more about Hash-Buster v3.0 – Crack Hashes In Seconds
osint
  • News

XLoader, a $49 spyware that could target both Windows and macOS devices

July 21, 2021

Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and...

Read MoreRead more about XLoader, a $49 spyware that could target both Windows and macOS devices
osint
  • News

Kelihos botmaster Peter Levashov gets time served

July 21, 2021

A US federal judge sentenced Russian hacker Peter Levashov to 33 months, time served, and three years of supervised release...

Read MoreRead more about Kelihos botmaster Peter Levashov gets time served

Posts pagination

Previous 1 … 3,848 3,849 3,850 3,851 3,852 3,853 3,854 … 4,146 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: idor-vulnerability-at-addtagtoassets-operation-name-root-geek

June 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5814

June 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5303

June 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47601

June 8, 2025
cybercrime
  • News

Linux Foundation Tries To Play Peacemaker In Ongoing WordPress Scuffle

June 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel