Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Securing Critical Infrastructure in the Digital Age

July 18, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
some_words
  • Tools

Haklistgen – Turns Any Junk Text Into A Usable Wordlist For Brute-Forcing

September 25, 2021

Turns any junk text into a usable wordlist for brute-forcing.Installationgo install github.com/hakluke/haklistgen@latest Usage ExamplesScrape all words out of an HTTP...

Read MoreRead more about Haklistgen – Turns Any Junk Text Into A Usable Wordlist For Brute-Forcing
Reconky-Automated_Bash_Script_1_Recon-705128
  • Tools

Reconky – A Great Content Discovery Bash Script For Bug Bounty Hunters Which Automate Lot Of Task And Organized It

September 25, 2021

Reconky is a script written in bash to automate the task of recon and information gathering.This Bash Script allows you...

Read MoreRead more about Reconky – A Great Content Discovery Bash Script For Bug Bounty Hunters Which Automate Lot Of Task And Organized It
1f92f-1
  • News

Researcher released PoC exploit code for 3 iOS zero-day issues

September 24, 2021

Researcher release PoC exploit code for three iOS zero-day flaws after Apple delayed addressing them and did not credit him....

Read MoreRead more about Researcher released PoC exploit code for 3 iOS zero-day issues
osint
  • News

Cisco addresses 3 critical vulnerabilities in IOS XE Software

September 24, 2021

Cisco fixed three critical flaws impacting IOS XE operating system powering some of its devices, such as routers and wireless...

Read MoreRead more about Cisco addresses 3 critical vulnerabilities in IOS XE Software
osint
  • News

3.8 billion Clubhouse and Facebook user records allegedly scraped and merged, put for sale online

September 24, 2021

A user on a popular hacker forum is selling a database that purportedly contains 3.8 billion Clubhouse and Facebook user...

Read MoreRead more about 3.8 billion Clubhouse and Facebook user records allegedly scraped and merged, put for sale online
osint
  • News

New FamousSparrow APT group used ProxyLogon exploits in its attacks

September 24, 2021

Researchers spotted a new cyberespionage group, dubbed FamousSparrow, that used ProxyLogon exploits to target hotels worldwide. Researchers from ESET discovered a...

Read MoreRead more about New FamousSparrow APT group used ProxyLogon exploits in its attacks
osint
  • News

Apple addresses a new zero-day exploited to deploy the NSO Pegasus spyware

September 24, 2021

Apple has addressed three zero-day vulnerabilities exploited by threat actors in attacks in the wild to take over iPhones and...

Read MoreRead more about Apple addresses a new zero-day exploited to deploy the NSO Pegasus spyware
osint
  • News

A bug in Microsoft Exchange Autodiscover feature leaks +372K of domain credentials

September 24, 2021

A flaw in the Microsoft Exchange Autodiscover feature can be exploited to harvest Windows domain and app credentials. Security researchers...

Read MoreRead more about A bug in Microsoft Exchange Autodiscover feature leaks +372K of domain credentials
CVE-prog
  • Vulnerabilities

CVE-2019-10172

September 24, 2021

Summary: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but...

Read MoreRead more about CVE-2019-10172
CVE-prog
  • Vulnerabilities

CVE-2019-10172

September 24, 2021

Summary: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but...

Read MoreRead more about CVE-2019-10172
CVE-prog
  • Vulnerabilities

CVE-2021-39123

September 24, 2021

Summary: Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to impact the application's availability via...

Read MoreRead more about CVE-2021-39123
CVE-prog
  • Vulnerabilities

CVE-2021-41054

September 24, 2021

Summary: tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of...

Read MoreRead more about CVE-2021-41054
CVE-prog
  • Vulnerabilities

CVE-2019-9489

September 24, 2021

Summary: A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (versions XG and 11.0), and Worry-Free Business Security (versions...

Read MoreRead more about CVE-2019-9489
CVE-prog
  • Vulnerabilities

CVE-2021-23048

September 24, 2021

Summary: On BIG-IP version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, 13.1.x before 13.1.4.1, and all versions of...

Read MoreRead more about CVE-2021-23048
cyber-security-1805632_1280
  • Vulnerabilities

CVE-2021-30869 – Apple / Multiple – Type confusion

September 24, 2021

Summary: CVE-2021-30869 is a type confusion vulnerability impacting Apple iOS versions 12.5.4 and earlier, and macOS Catalina security update 2021-005...

Read MoreRead more about CVE-2021-30869 – Apple / Multiple – Type confusion
domains_taken-600x425-1
  • News

Microsoft Exchange Autodiscover flaw reveals users’ passwords

September 24, 2021

Researchers have been able to get hold of 372,072 Windows domain credentials, including 96,671 unique credentials, in slightly over 4...

Read MoreRead more about Microsoft Exchange Autodiscover flaw reveals users’ passwords
osint
  • News

How to clear your cache

September 24, 2021

The term “cache” refers to a storage container. If you’re familiar with the outdoor recreational activity geocaching, you may be...

Read MoreRead more about How to clear your cache
1f6a9
  • News

Italian mafia cybercrime sting leads to 100+ arrests

September 24, 2021

The Spanish National Police (Policía Nacional) has successfully dismantled an organized crime ring of hundreds of members in a sting...

Read MoreRead more about Italian mafia cybercrime sting leads to 100+ arrests
banner-1090955_1920
  • News

A Second Data Breach at the Ministry of Defence has been Discovered

September 24, 2021

 The email addresses of dozens more Afghans who may be eligible for relocation in the United Kingdom have been exposed...

Read MoreRead more about A Second Data Breach at the Ministry of Defence has been Discovered
phishing-6573326_1280
  • News

Hackers hacked the accounts of employees of government agencies in Russia and more than ten other neighboring countries

September 24, 2021

The British company Cyjax discovered a large-scale attack against employees of state agencies in Russia and neighboring countries. Attackers create...

Read MoreRead more about Hackers hacked the accounts of employees of government agencies in Russia and more than ten other neighboring countries
pietro-jeng-n6B49lTx7NM-unsplash-4
  • News

New Mac Malware Trick Users By Posing as Legitimate macOS Tool

September 24, 2021

 Chinese cybersecurity researcher has discovered a new strain of malware that spreads via "poisoned" search-engine results. The malware dubbed ‘OSX.ZuRu’...

Read MoreRead more about New Mac Malware Trick Users By Posing as Legitimate macOS Tool
hacker-4703108_1280
  • News

Russia demanded an explanation from the United States about cyber attacks during the State Duma elections

September 24, 2021

 The Russian Embassy in Washington demanded an explanation from the United States about the cyber attacks that were committed on...

Read MoreRead more about Russia demanded an explanation from the United States about cyber attacks during the State Duma elections
pexels-energepiccom-1598882B252822529
  • News

Microsoft Discovered a Massive Phishing-as-a-Service Operation

September 24, 2021

 On September 21, Microsoft's security team announced that it has discovered a huge operation that delivers phishing services to cybercrime...

Read MoreRead more about Microsoft Discovered a Massive Phishing-as-a-Service Operation
SAS_2021_featured-990x400-1
  • News

Wake me up till SAS summit ends

September 24, 2021

What do cyberthreats, Kubernetes and donuts have in common – except that all three end in “ts”, that is? All...

Read MoreRead more about Wake me up till SAS summit ends

Posts pagination

Previous 1 … 3,895 3,896 3,897 3,898 3,899 3,900 3,901 … 4,254 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hkcert
  • HKCERT
  • News

Ubuntu Linux Kernel Multiple Vulnerabilities

July 18, 2025
hkcert
  • HKCERT
  • News

F5 Products Denial of Service Vulnerability

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7757

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7756

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-23269

July 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel