Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
pexels-pixabay-373543
  • News

Millions of the Pentagon’s Dormant IP Addresses Sprang to Life, Just Minutes Before Trump Left Office

April 28, 2021

 While the world was focused on President Donald Trump's departure on Jan. 20, an obscure Florida corporation quietly revealed a...

Read MoreRead more about Millions of the Pentagon’s Dormant IP Addresses Sprang to Life, Just Minutes Before Trump Left Office
hacker-5481612_12802B252812529
  • News

More than one hundred Russian companies were subjected to a cyber attack

April 28, 2021

Kaspersky Lab, which specializes in developing systems to protect against cyber threats, reported a fraudulent mailing on behalf of The...

Read MoreRead more about More than one hundred Russian companies were subjected to a cyber attack
sai-kiran-anagani-5Ntkpxqt54Y-unsplash-1
  • News

250 Million Americans Sensitive Data Leaked Online by Pompompurin

April 28, 2021

 As of 22nd April 2021, a Pompompurin named hacker group dropped a database of more than 250 (250,806,711) million American...

Read MoreRead more about 250 Million Americans Sensitive Data Leaked Online by Pompompurin
iphone-410311_1280
  • News

Apple’s AirDrop Comes with a Security Flaw

April 28, 2021

 Due to its intriguing features, the much-hyped announcement of AirDrop at the Apple event drew a lot of attention. However,...

Read MoreRead more about Apple’s AirDrop Comes with a Security Flaw
abstract-digital-yellow-990x400-1
  • News

APT trends report Q1 2021

April 28, 2021

For four years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent...

Read MoreRead more about APT trends report Q1 2021
fav-up_1
  • Tools

Fav-Up – IP Lookup By Favicon Using Shodan

April 28, 2021

Lookups for real IP starting from the favicon icon and using Shodan.Installationpip3 install -r requirements.txt Shodan API key (not the...

Read MoreRead more about Fav-Up – IP Lookup By Favicon Using Shodan
lsdsisfs
  • Tools

Ldsview – Offline search tool for LDAP directory dumps in LDIF format

April 28, 2021

Offline search tool for LDAP directory dumps in LDIF format. FeaturesFast and memory efficient parsing of LDIF files Build ldapsearch...

Read MoreRead more about Ldsview – Offline search tool for LDAP directory dumps in LDIF format
osint
  • News

CISA, NIST published an advisory on supply chain attacks

April 27, 2021

CISA and NIST published a report on software supply chain attacks that shed light on the associated risks and provide...

Read MoreRead more about CISA, NIST published an advisory on supply chain attacks
osint
  • News

Ransomware hit Guilderland Central School District near Albany

April 27, 2021

Officials revealed that the school district near Albany was hit by a ransomware attack that forced students in grades 7...

Read MoreRead more about Ransomware hit Guilderland Central School District near Albany
osint
  • News

Microsoft Defender uses Intel TDT technology against crypto-mining malware

April 27, 2021

Microsoft announced an improvement of its Defender antivirus that will leverage Intel’s Threat Detection Technology (TDT) to detect processes associated...

Read MoreRead more about Microsoft Defender uses Intel TDT technology against crypto-mining malware
osint
  • News

Shlayer macOS malware abuses zero-day to bypass Gatekeeper feature

April 27, 2021

Apple addresses a zero-day in macOS exploited by Shlayer malware to bypass Apple’s security features and deliver second-stage malicious payloads. Apple...

Read MoreRead more about Shlayer macOS malware abuses zero-day to bypass Gatekeeper feature
osint
  • News

Boffins found a bug in Apple AirDrop that could leak users’ personal info

April 27, 2021

Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. Boffins from the...

Read MoreRead more about Boffins found a bug in Apple AirDrop that could leak users’ personal info
CVE-prog
  • Vulnerabilities

CVE-2021-23133

April 27, 2021

Summary: A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the...

Read MoreRead more about CVE-2021-23133
CVE-prog
  • Vulnerabilities

CVE-2021-21341

April 27, 2021

Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...

Read MoreRead more about CVE-2021-21341
CVE-prog
  • Vulnerabilities

CVE-2021-21343

April 27, 2021

Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...

Read MoreRead more about CVE-2021-21343
CVE-prog
  • Vulnerabilities

CVE-2020-36323

April 27, 2021

Summary: In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized...

Read MoreRead more about CVE-2020-36323
CVE-prog
  • Vulnerabilities

CVE-2021-27252

April 27, 2021

Summary: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication...

Read MoreRead more about CVE-2021-27252
GettyImages-1153486593-e1618537318191-1024x614-1
  • News

Apple patches ‘worst macOS bug in recent memory’ after it was used in the wild

April 27, 2021

A newly discovered bug, patched in macOS 11.3, allowed hackers to circumvent much of Apple’s built-in malware detection for programs...

Read MoreRead more about Apple patches ‘worst macOS bug in recent memory’ after it was used in the wild
osint
  • News

Password manager hijacked to deliver malware in supply chain attack

April 27, 2021

In the latest example of a supply chain attack, cybercriminals delivered malware to customers of the business password manager Passwordstate...

Read MoreRead more about Password manager hijacked to deliver malware in supply chain attack
osint
  • News

Zoom deepfaker fools politicians…twice

April 27, 2021

We recently said deepfakes “remain the weapon of choice for malign interference campaigns, troll farms, revenge porn, and occasionally humorous...

Read MoreRead more about Zoom deepfaker fools politicians…twice
osint
  • News

Breaking free from the VirusTotal silo: Lock and Code S02E07

April 27, 2021

This week on Lock and Code, we speak to Malwarebytes Chief Information Security Officer John Donovan about the flaws in...

Read MoreRead more about Breaking free from the VirusTotal silo: Lock and Code S02E07
06_2.1.0_SexBreakdown_Pie_x3-600x207-1
  • News

11-13 year old girls most likely to be targeted by online predators

April 27, 2021

The Internet Watch Foundation (IWF), a not-for-profit organization in England whose mission is “to eliminate child sexual abuse imagery online”,...

Read MoreRead more about 11-13 year old girls most likely to be targeted by online predators
pietro-jeng-n6B49lTx7NM-unsplash-4
  • News

Threat Actors are Using YouTube to Lure Users into their Trap

April 27, 2021

 Fortinet security researcher ‘accidentally discovered a unique way of tricking YouTube users. Due to Covid-19, as well as the recent...

Read MoreRead more about Threat Actors are Using YouTube to Lure Users into their Trap
pexels-freestocksorg-1122528
  • News

A Ransomware Group Made $260,000 in 5 Days

April 27, 2021

 A ransomware group made $260,000 by remotely encrypting files on QNAP computers using the 7zip archive software in an interval...

Read MoreRead more about A Ransomware Group Made $260,000 in 5 Days

Posts pagination

Previous 1 … 3,850 3,851 3,852 3,853 3,854 3,855 3,856 … 4,077 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:2222

May 16, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: olympusaero[.]com

May 16, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: azpiaran[.]com

May 15, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: wnyenergy[.]com

May 15, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: ITinSell group

May 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel