Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Securing Critical Infrastructure in the Digital Age

July 18, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
fb-uss-kidd-600x443-1
  • News

US Navy ship Facebook page hijacked to stream video games

October 7, 2021

The official Facebook page of the US Navy’s destroyer-class warship, USS Kidd, has been hijacked. According to Task & Purpose,...

Read MoreRead more about US Navy ship Facebook page hijacked to stream video games
osint
  • News

PoC exploit for 2 flaws in Dahua cameras leaked online

October 7, 2021

A proof of concept exploit for two authentication bypass vulnerabilities in Dahua cameras is available online, users are recommended to...

Read MoreRead more about PoC exploit for 2 flaws in Dahua cameras leaked online
CVE-prog
  • Vulnerabilities

CVE-2021-39836

October 7, 2021

Summary: Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free...

Read MoreRead more about CVE-2021-39836
CVE-prog
  • Vulnerabilities

CVE-2021-1565

October 7, 2021

Summary: Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software...

Read MoreRead more about CVE-2021-1565
CVE-prog
  • Vulnerabilities

CVE-2021-37273

October 7, 2021

Summary: A Denial of Service issue exists in China Telecom Corporation EPON Tianyi Gateway ZXHN F450(EPON ONU) 3.0. Tianyi Gateway...

Read MoreRead more about CVE-2021-37273
CVE-prog
  • Vulnerabilities

CVE-2021-36297

October 7, 2021

Summary: SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary...

Read MoreRead more about CVE-2021-36297
CVE-prog
  • Vulnerabilities

CVE-2021-41104

October 7, 2021

Summary: ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version...

Read MoreRead more about CVE-2021-41104
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Fantasy Football Hub – 66,479 breached accounts

October 7, 2021

In October 2021, the fantasy premier league (soccer) website Fantasy Football Hub suffered a data breach that exposed 66 thousand...

Read MoreRead more about Fantasy Football Hub – 66,479 breached accounts
SpoolSploit_1_SpoolSploit-Usage
  • Tools

SpoolSploit – A Collection Of Windows Print Spooler Exploits Containerized With Other Utilities For Practical Exploitation

October 7, 2021

A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.SummarySpoolSploit is a collection of Windows print...

Read MoreRead more about SpoolSploit – A Collection Of Windows Print Spooler Exploits Containerized With Other Utilities For Practical Exploitation
osint
  • News

Stop. Do you really need another security tool?

October 7, 2021

The last few years have seen a mushrooming of the number and type of security tools that organizations can use...

Read MoreRead more about Stop. Do you really need another security tool?
osint
  • News

Twitch data breach updates: login credentials or card numbers not exposed

October 7, 2021

An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...

Read MoreRead more about Twitch data breach updates: login credentials or card numbers not exposed
1f440
  • News

Google to auto-enrol users, YouTubers into 2SV

October 7, 2021

Google’s announced some changes to how it’s helping millions of its users stay safe and secure. The biggest of those...

Read MoreRead more about Google to auto-enrol users, YouTubers into 2SV
osint
  • News

Operation GhostShell: MalKamak APT targets aerospace and telco firms

October 7, 2021

Operation GhostShell: Threat actors used ShellClient malware in cyberespionage campaigns aimed at companies in the aerospace and telecommunications sectors. Hackers...

Read MoreRead more about Operation GhostShell: MalKamak APT targets aerospace and telco firms
osint
  • News

Exclusive: Researchers dumped Gigabytes of data from Agent Tesla C2Cs

October 6, 2021

Resecurity researchers dumped Gigabytes of data from Agent Tesla C2Cs, one of the most well-known cyberespionage tools suffers a data...

Read MoreRead more about Exclusive: Researchers dumped Gigabytes of data from Agent Tesla C2Cs
osint
  • News

Twitch source code and sensitive data leaked online

October 6, 2021

An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...

Read MoreRead more about Twitch source code and sensitive data leaked online
Smersh_4_smersh-body
  • Tools

Smersh – A Pentest Oriented Collaborative Tool Used To Track The Progress Of Your Company’S Missions

October 6, 2021

Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions and generate rapport.Preview front...

Read MoreRead more about Smersh – A Pentest Oriented Collaborative Tool Used To Track The Progress Of Your Company’S Missions
osint
  • News

What special needs kids need to stay safe online

October 6, 2021

Online safety is hard enough for most adults. We reuse weak passwords, we click on suspicious links, and we love...

Read MoreRead more about What special needs kids need to stay safe online
osint
  • News

Patch now! Apache fixes zero-day vulnerability in HTTP Server

October 6, 2021

The Apache HTTP Server 2.4.49 is vulnerable to a flaw that allows attackers to use a path traversal attack to...

Read MoreRead more about Patch now! Apache fixes zero-day vulnerability in HTTP Server
CVE-prog
  • Vulnerabilities

CVE-2020-26217

October 6, 2021

Summary: XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary...

Read MoreRead more about CVE-2020-26217
CVE-prog
  • Vulnerabilities

CVE-2021-27034

October 6, 2021

Summary: A heap-based buffer overflow could occur while parsing PICT or TIFF files in Autodesk 2018, 2017, 2013, 2012, 2011....

Read MoreRead more about CVE-2021-27034
CVE-prog
  • Vulnerabilities

CVE-2021-27035

October 6, 2021

Summary: A maliciously crafted TIFF, PDF, PICT or DWF files in Autodesk 2018, 2017, 2013, 2012, 2011 can be forced...

Read MoreRead more about CVE-2021-27035
CVE-prog
  • Vulnerabilities

CVE-2021-27036

October 6, 2021

Summary: A maliciously crafted PDF, PICT or TIFF file can be used to write beyond the allocated buffer while parsing...

Read MoreRead more about CVE-2021-27036
CVE-prog
  • Vulnerabilities

CVE-2021-28130

October 6, 2021

Summary: Dr.Web Firewall 12.5.2.4160 on Windows incorrectly restricts applications signed by Dr.Web. A DLL for a custom payload within a...

Read MoreRead more about CVE-2021-28130
CVE-prog
  • Vulnerabilities

CVE-2021-28130

October 6, 2021

Summary: Dr.Web Firewall 12.5.2.4160 on Windows incorrectly restricts applications signed by Dr.Web. A DLL for a custom payload within a...

Read MoreRead more about CVE-2021-28130

Posts pagination

Previous 1 … 3,886 3,887 3,888 3,889 3,890 3,891 3,892 … 4,255 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Tiger Communications

July 18, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Ritenour School District

July 18, 2025
image
  • Data Breach
  • Ransomware

[CICADA3301] – Ransomware Victim: B&M – Expertise – Audit

July 18, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: LeasePLUS

July 18, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Polykar

July 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel