Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols

June 2, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025
unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025
unlock_membership
  • Premium Members Content

Mastering Social Engineering Attacks How to Recognize and Prevent Them

May 23, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

DHS announces security measures for critical pipeline industry

May 28, 2021

The US Department of Homeland Security (DHS) has announced new cybersecurity requirements for critical pipeline owners and operators. The Colonial pipeline...

Read MoreRead more about DHS announces security measures for critical pipeline industry
CVE-prog
  • Vulnerabilities

CVE-2021-1084

May 28, 2021

Summary: NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in...

Read MoreRead more about CVE-2021-1084
CVE-prog
  • Vulnerabilities

CVE-2021-1085

May 28, 2021

Summary: NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where there is the potential to...

Read MoreRead more about CVE-2021-1085
CVE-prog
  • Vulnerabilities

CVE-2019-15992

May 28, 2021

Summary: A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco...

Read MoreRead more about CVE-2019-15992
CVE-prog
  • Vulnerabilities

CVE-2021-1074

May 28, 2021

Summary: NVIDIA Windows GPU Display Driver for Windows, R390 driver branch, contains a vulnerability in its installer where an attacker...

Read MoreRead more about CVE-2021-1074
CVE-prog
  • Vulnerabilities

CVE-2021-33502

May 28, 2021

Summary: The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression...

Read MoreRead more about CVE-2021-33502
GettyImages-1221900389-e1612835394228-1024x614-1
  • News

How Florida water attack investigators avoided an embarrassing misattribution

May 28, 2021

An aerial view of a wastewater treatment plant in California. An attempt to poison the Oldsmar, Florida water supply by...

Read MoreRead more about How Florida water attack investigators avoided an embarrassing misattribution
osint
  • News

RMM software: What is it and do you need it?

May 28, 2021

As cybersecurity products evolve to better protect against new forms of malware, trickier evasion techniques, and more organized cybercrime campaigns,...

Read MoreRead more about RMM software: What is it and do you need it?
osint
  • News

Falsifying and weaponizing certified PDFs

May 28, 2021

The Portable Document Format (PDF) file type is one of the most common file formats in use today. It’s value...

Read MoreRead more about Falsifying and weaponizing certified PDFs
osint
  • News

Healthcare service faces test of willpower with Ransomware authors

May 28, 2021

Healthcare and ransomware are in the news in a big way. Data leaks are inevitable, but those are typically associated...

Read MoreRead more about Healthcare service faces test of willpower with Ransomware authors
canada-159585_1280
  • News

Canada Post’s Data Breach Affected 950K Customers

May 28, 2021

 The state-owned postal service, Canada Post has reported that a cyber-attack on a third-party provider resulted in a data breach...

Read MoreRead more about Canada Post’s Data Breach Affected 950K Customers
technology-4816658_1280
  • News

Moscow has completed a large-scale study on the security of 5G

May 28, 2021

The press service of the Moscow Department of Information Technologies informs that the specialists of the Scientific-Research Institute of Metallurgical...

Read MoreRead more about Moscow has completed a large-scale study on the security of 5G
shahadat-rahman-BfrQnKBulYQ-unsplash-4
  • News

Social Media Giants Seek Futher Extension in Deadline to Comply with Government Rules

May 28, 2021

 Social media companies such as Facebook, Twitter, YouTube, Instagram, and WhatsApp will lose their status as ‘intermediaries” that granted them...

Read MoreRead more about Social Media Giants Seek Futher Extension in Deadline to Comply with Government Rules
pexels-kartikey-das-413279
  • News

M1RACLES Bug Impacts Apple M1 Chips

May 28, 2021

 A security researcher identified the first-ever vulnerability in Apple M1 chips that requires a silicon redesign to fix. The good...

Read MoreRead more about M1RACLES Bug Impacts Apple M1 Chips
firmbee-com-eMemmpUojlw-unsplash
  • News

Research Reveals More Than 2000 Chrome Extensions Disabled Security Headers

May 28, 2021

 Tens of thousands of Google Chrome extensions accessible from the official Chrome Online Store manipulate security headers on major websites,...

Read MoreRead more about Research Reveals More Than 2000 Chrome Extensions Disabled Security Headers
dystopia_1_preview
  • Tools

Dystopia – Low To Medium Multithreaded Ubuntu Core Honeypot Coded In Python

May 28, 2021

Low to medium Ubuntu Core honeypot coded in Python.FeaturesOptional Login Prompt Logs commands used and IP addresses Customize MOTD, Port,...

Read MoreRead more about Dystopia – Low To Medium Multithreaded Ubuntu Core Honeypot Coded In Python
FireStorePwn_1
  • Tools

FireStorePwn – Firestore Database Vulnerability Scanner Using APKs

May 28, 2021

fsp scans an APK and checks the Firestore database for rules that are not secure, testing with or without authentication....

Read MoreRead more about FireStorePwn – Firestore Database Vulnerability Scanner Using APKs
osint
  • News

NASA identified 1,785 cyber incidents in 2020

May 27, 2021

NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office...

Read MoreRead more about NASA identified 1,785 cyber incidents in 2020
osint
  • News

Hackers compromised Japanese government offices via Fujitsu ‘s ProjectWEB tool

May 27, 2021

Threat actors have compromised offices of multiple Japanese agencies via Fujitsu ‘s ProjectWEB information sharing tool. Threat actors have breached...

Read MoreRead more about Hackers compromised Japanese government offices via Fujitsu ‘s ProjectWEB tool
osint
  • News

M1RACLES, the unpatchable bug that impacts new Apple M1 chips

May 27, 2021

A security expert has discovered a vulnerability in Apple M1 chips, dubbed M1RACLES, that cannot be fixed. Software engineer Hector...

Read MoreRead more about M1RACLES, the unpatchable bug that impacts new Apple M1 chips
osint
  • News

Nearly 50,000 IPs compromised in Kubernetes clusters by TeamTNT

May 27, 2021

Researchers discovered about 50,000 IPs across multiple Kubernetes clusters that were compromised by the TeamTNT.threat actors. Researchers from Trend Micro reported...

Read MoreRead more about Nearly 50,000 IPs compromised in Kubernetes clusters by TeamTNT
1f3f4-200d-2620-fe0f-1
  • News

French police seized dark web marketplace Le Monde Parallèle

May 27, 2021

Last week, French authorities have seized the dark web marketplace Le Monde Parallèle, it is another success of national police...

Read MoreRead more about French police seized dark web marketplace Le Monde Parallèle
CVE-prog
  • Vulnerabilities

CVE-2021-3480

May 27, 2021

Summary: A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the...

Read MoreRead more about CVE-2021-3480
CVE-prog
  • Vulnerabilities

CVE-2021-33477

May 27, 2021

Summary: rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of...

Read MoreRead more about CVE-2021-33477

Posts pagination

Previous 1 … 3,879 3,880 3,881 3,882 3,883 3,884 3,885 … 4,134 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Davies, Mcfarland & Carroll

June 5, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: FORTÉ

June 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46011

June 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46204

June 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-31482

June 5, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel