Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

New Ryuk ransomware implements self-spreading capabilities

February 27, 2021

French experts spotted a new Ryuk ransomware variant that implements self-spreading capabilities to infect other devices on victims’ local networks....

Read MoreRead more about New Ryuk ransomware implements self-spreading capabilities
osint
  • News

Microsoft releases open-source CodeQL queries to assess Solorigate compromise

February 27, 2021

Microsoft announced the release of open-source CodeQL queries that it experts used during its investigation into the SolarWinds supply-chain attack...

Read MoreRead more about Microsoft releases open-source CodeQL queries to assess Solorigate compromise
CVE-prog
  • Vulnerabilities

CVE-2021-26683

February 27, 2021

Summary: A remote authenticated command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1....

Read MoreRead more about CVE-2021-26683
CVE-prog
  • Vulnerabilities

CVE-2020-11223

February 27, 2021

Summary: Out of bound in camera driver due to lack of check of validation of array index before copying into...

Read MoreRead more about CVE-2020-11223
CVE-prog
  • Vulnerabilities

CVE-2021-20247

February 27, 2021

Summary: A flaw was found in mbsync before v1.3.5 and v1.4.1. Validations of the mailbox names returned by IMAP LIST/LSUB...

Read MoreRead more about CVE-2021-20247
CVE-prog
  • Vulnerabilities

CVE-2020-7846

February 27, 2021

Summary: Helpcom before v10.0 contains a file download and execution vulnerability caused by storing hardcoded cryptographic key. It finally leads...

Read MoreRead more about CVE-2020-7846
CVE-prog
  • Vulnerabilities

CVE-2021-22882

February 27, 2021

Summary: UniFi Protect before v1.17.1 allows an attacker to use spoofed cameras to perform a denial-of-service attack that may cause...

Read MoreRead more about CVE-2021-22882
osint
  • News

TikTok pays $92 million to end data theft lawsuit

February 27, 2021

TikTok, the now widely popular social media platform that allows users to create, share, and discover, short video clips has...

Read MoreRead more about TikTok pays $92 million to end data theft lawsuit
robot-4149584_1920
  • News

Unprotected Private Key Allows Remote Hacking of PLCs

February 27, 2021

 Industrial associations have been cautioned for this present week that a critical authentication bypass vulnerability can permit hackers to remotely...

Read MoreRead more about Unprotected Private Key Allows Remote Hacking of PLCs
hacker-1725256_1280
  • News

AIVD says they face cyber attacks from Russia and China every day

February 27, 2021

According to the head of the country's General Intelligence and Security Service, these hackers break into the computers of companies...

Read MoreRead more about AIVD says they face cyber attacks from Russia and China every day
mitchell-luo-jz4ca36oJ_M-unsplash-2
  • News

Google Reveals Details of a Recently Patched Windows Flaw

February 27, 2021

 Google Project Zero team disclosed the details of a recently fixed Windows flaw, tracked as CVE-2021-24093, that can be compromised...

Read MoreRead more about Google Reveals Details of a Recently Patched Windows Flaw
regulation-3246979_1280
  • News

15,000 Clients Data Leaked Accidently by a Turkish Firm

February 27, 2021

 Accidentally, a law firm has disclosed client data of 15,000 incidents in which individuals have been killed and wounded after...

Read MoreRead more about 15,000 Clients Data Leaked Accidently by a Turkish Firm
code-1486361_1920
  • News

Turkey Dog Activity Continues to use COVID Lures

February 27, 2021

 A year into the pandemic, Turkey Dog-related activity is ongoing with campaigns that keep on utilizing the "free internet" lures....

Read MoreRead more about Turkey Dog Activity Continues to use COVID Lures
digital_eye_stalker_abstract-990x400-1
  • News

The state of stalkerware in 2020

February 27, 2021

 The state of stalkerware in 2020 (PDF) Main findings Kaspersky’s data shows that the scale of the stalkerware issue has...

Read MoreRead more about The state of stalkerware in 2020
cornershot_1_csdemo
  • Tools

CornerShot – Amplify Network Visibility From Multiple POV Of Other Hosts

February 27, 2021

In warfare, CornerShot is a weapon that allows a soldier to look past a corner (and possibly take a shot),...

Read MoreRead more about CornerShot – Amplify Network Visibility From Multiple POV Of Other Hosts
wifi
  • Tools

OpenWifiPass – An Open Source Implementation Of Apple’s Wi-Fi Password Sharing Protocol In Python

February 27, 2021

An open source implementation of the grantor role in Apple's Wi-Fi Password Sharing protocol. DisclaimerOpenWifiPass is experimental software and is...

Read MoreRead more about OpenWifiPass – An Open Source Implementation Of Apple’s Wi-Fi Password Sharing Protocol In Python
osint
  • News

Data Breach: Turkish legal advising company exposed over 15,000 clients

February 26, 2021

Data Breach: WizCase team uncovered a massive data leak containing private information about Turkish Citizens through a misconfigured Amazon S3 bucket....

Read MoreRead more about Data Breach: Turkish legal advising company exposed over 15,000 clients
osint
  • News

Hackers are selling access to Biochemical systems at Oxford University Lab

February 26, 2021

Hackers have broken into the biochemical systems of an Oxford University lab where researchers are working on the study of...

Read MoreRead more about Hackers are selling access to Biochemical systems at Oxford University Lab
osint
  • News

Dutch Research Council (NWO) confirms DoppelPaymer ransomware attack

February 26, 2021

Dutch Research Council (NWO) confirmed that the recent cyberattack that forced it to take its servers offline was caused by...

Read MoreRead more about Dutch Research Council (NWO) confirms DoppelPaymer ransomware attack
osint
  • News

China-linked TA413 group target Tibetan organizations

February 26, 2021

The Chinese hacking group, tracked as TA413, used a malicious Firefox add-on in a cyberespionage campaign aimed at Tibetans. China-linked...

Read MoreRead more about China-linked TA413 group target Tibetan organizations
osint
  • News

Cisco fixes three critical bugs in ACI Multi-Site Orchestrator, Application Services Engine, and NX-OS

February 26, 2021

Cisco addressed over a dozen vulnerabilities in its products, including three critical bugs in ACI Multi-Site Orchestrator, Application Services Engine,...

Read MoreRead more about Cisco fixes three critical bugs in ACI Multi-Site Orchestrator, Application Services Engine, and NX-OS
osint
  • News

North Korea-linked Lazarus APT targets defense industry with ThreatNeedle backdoor

February 26, 2021

North Korea-linked Lazarus APT group has targeted the defense industry with the custom-backdoor dubbed ThreatNeedle since 2020. North Korea-linked Lazarus...

Read MoreRead more about North Korea-linked Lazarus APT targets defense industry with ThreatNeedle backdoor
CVE-prog
  • Vulnerabilities

CVE-2020-11296

February 26, 2021

Summary: Arithmetic overflow can happen while processing NOA IE due to improper error handling in Snapdragon Auto, Snapdragon Compute, Snapdragon...

Read MoreRead more about CVE-2020-11296
CVE-prog
  • Vulnerabilities

CVE-2020-11194

February 26, 2021

Summary: Possible out of bound access in TA while processing a command from NS side due to improper length check...

Read MoreRead more about CVE-2020-11194

Posts pagination

Previous 1 … 3,896 3,897 3,898 3,899 3,900 3,901 3,902 … 4,068 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-3528

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-13961

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3897

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-13962

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-9524

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel