Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols

June 2, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025
unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2021-32708

July 1, 2021

Summary: Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes...

Read MoreRead more about CVE-2021-32708
osint
  • News

Police seize DoubleVPN data, servers, and domain

July 1, 2021

A coordinated effort between global law enforcement agencies—led by the Dutch National Police—shut down a VPN service that was advertised...

Read MoreRead more about Police seize DoubleVPN data, servers, and domain
osint
  • News

Babuk ransomware builder leaked following muddled “retirement”

July 1, 2021

In the last days of April 2021, the operators of Babuk ransomware announced they were going to focus on demanding...

Read MoreRead more about Babuk ransomware builder leaked following muddled “retirement”
privacy-shark-tomliner-600x558-1
  • News

Second colossal LinkedIn “breach” in 3 months, almost all users affected

July 1, 2021

LinkedIn has reportedly been breached—again—following reports of a massive sale of information scraped from 500M LinkedIn user profiles in the...

Read MoreRead more about Second colossal LinkedIn “breach” in 3 months, almost all users affected
business-6174790_1280
  • News

Logins and passwords of at least 1.2 million Russians have been leaked online

July 1, 2021

 The credential verification service developed by cybersecurity company BI.ZONE (a subsidiary of Sberbank) has revealed that information about logins and...

Read MoreRead more about Logins and passwords of at least 1.2 million Russians have been leaked online
adi-goldstein-EUsVwEOsblE-unsplash
  • News

Threat Actors Target Aviation Firms Via Spear Phishing Campaign

July 1, 2021

 Fortinet researchers discovered a spear-phishing campaign targeting the aviation industry with malicious download links that distribute the AsyncRAT with a...

Read MoreRead more about Threat Actors Target Aviation Firms Via Spear Phishing Campaign
red-shadow_1_red-shadow-788839
  • Tools

Red-Shadow – Lightspin AWS IAM Vulnerability Scanner

July 1, 2021

Scan your AWS IAM Configuration for shadow admins in AWS IAM based on misconfigured deny policies not affecting users in...

Read MoreRead more about Red-Shadow – Lightspin AWS IAM Vulnerability Scanner
Forblaze
  • Tools

Forblaze – A Python Mac Steganography Payload Generator

July 1, 2021

Forblaze is a project designed to provide steganography capabilities to Mac OS payloads. Using python3, it will build an Obj-C...

Read MoreRead more about Forblaze – A Python Mac Steganography Payload Generator
osint
  • News

Colombian authorities arrested hacker behind the Gozi Virus

June 30, 2021

Colombian authorities arrested a Romanian hacker who is wanted in the U.S. for distributing the Gozi virus that already infected...

Read MoreRead more about Colombian authorities arrested hacker behind the Gozi Virus
osint
  • News

Russian-based DoubleVPN seized by law enforcement

June 30, 2021

Law enforcement seized the servers and customer logs for DoubleVPN, a double-encryption service widely used by threat actors for malicious...

Read MoreRead more about Russian-based DoubleVPN seized by law enforcement
osint
  • News

SolarWinds hackers remained hidden in Denmark’s central bank for months

June 30, 2021

Russia-linked threat actors compromised Denmark’s central bank (Danmarks Nationalbank) and remained in its systems for months. Russia-linked threat actors infected...

Read MoreRead more about SolarWinds hackers remained hidden in Denmark’s central bank for months
osint
  • News

New LinkedIn breach exposes data of 700 Million users

June 30, 2021

A new massive LinkedIn breach made the headlines, the leak reportedly exposes the data of 700M users, more than 92%...

Read MoreRead more about New LinkedIn breach exposes data of 700 Million users
osint
  • News

PoC exploit for CVE-2021-1675 RCE started circulating online

June 30, 2021

Proof-of-concept exploit code for CVE-2021-1675 flaw, an attacker could exploit it to compromise Windows systems. Proof-of-concept exploit code for the...

Read MoreRead more about PoC exploit for CVE-2021-1675 RCE started circulating online
CVE-prog
  • Vulnerabilities

CVE-2021-25653

June 30, 2021

Summary: A privilege escalation vulnerability was discovered in Avaya Aura Appliance Virtualization Platform Utilities (AVPU) that may potentially allow a...

Read MoreRead more about CVE-2021-25653
CVE-prog
  • Vulnerabilities

CVE-2021-21737

June 30, 2021

Summary: A smart STB product of ZTE is impacted by a permission and access control vulnerability. Due to insufficient protection...

Read MoreRead more about CVE-2021-21737
CVE-prog
  • Vulnerabilities

CVE-2021-25923

June 30, 2021

Summary: In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum...

Read MoreRead more about CVE-2021-25923
CVE-prog
  • Vulnerabilities

CVE-2021-33537

June 30, 2021

Summary: In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration...

Read MoreRead more about CVE-2021-33537
CVE-prog
  • Vulnerabilities

CVE-2020-28097

June 30, 2021

Summary: The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka...

Read MoreRead more about CVE-2020-28097
osint
  • News

Fired by algorithm: The future’s here and it’s a robot wearing a white collar

June 30, 2021

Black Mirror meets 1984. Imagine that your employer uses a bot to keep track of your “production level.” And when...

Read MoreRead more about Fired by algorithm: The future’s here and it’s a robot wearing a white collar
cyber-security-1805632_1280
  • Vulnerabilities

CVE-2021-1675 – Microsoft / Windows – RCE

June 30, 2021

Summary: CVE-2021-1675 is a remote code execution (RCE) vulnerability impacting multiple products and versions of Microsoft Windows. A proof of...

Read MoreRead more about CVE-2021-1675 – Microsoft / Windows – RCE
pexels-pixabay-3735432B252842529
  • News

5G Security Vulnerabilities Concern Mobile Operators

June 30, 2021

 As 5G private networks become more widely available in the next years, security may become a major concern for businesses....

Read MoreRead more about 5G Security Vulnerabilities Concern Mobile Operators
building-1011876_1920
  • News

Indian Origin Woman Rewarded with Rs 22 Lakh Bounty by Microsoft

June 30, 2021

 Aditi Singh, a 20-year-old Delhi-based ethical hacker, was awarded $30,000 (Rs 22 lakh roughly) for detecting a bug in the...

Read MoreRead more about Indian Origin Woman Rewarded with Rs 22 Lakh Bounty by Microsoft
linkedin-400850_1280
  • News

Data of 700 Million LinkedIn Users Has Been Compromised

June 30, 2021

 A massive breach has purportedly compromised the data of over 700 million LinkedIn users. LinkedIn has a total of 756...

Read MoreRead more about Data of 700 Million LinkedIn Users Has Been Compromised
cyber-4867294_1280
  • News

Russia intends to sign agreements with a number of countries in the field of cybersecurity

June 30, 2021

Deputy Secretary of the Security Council of the Russian Federation Oleg Khramov named several countries with which Moscow plans to...

Read MoreRead more about Russia intends to sign agreements with a number of countries in the field of cybersecurity

Posts pagination

Previous 1 … 3,863 3,864 3,865 3,866 3,867 3,868 3,869 … 4,144 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 118[.]107[.]221[.]14:443

June 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 45[.]125[.]33[.]150:80

June 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]43[.]2[.]116:80

June 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]140[.]239[.]162:80

June 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 120[.]27[.]235[.]78:80

June 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel