Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
laptop-820274_1280
  • News

Experts listed the methods used by fraudsters to obtain personal data

February 25, 2021

As noted by experts, information leakage in large companies does not often happen, but data theft can occur through contractorsScammers...

Read MoreRead more about Experts listed the methods used by fraudsters to obtain personal data
andre-francois-mckenzie-JrjhtBJ-pGU-unsplash-1
  • News

Bitcoin Slips 17% to $45,000 as Caution Sweeps Over Crypto

February 25, 2021

 Bitcoin, the world’s largest cryptocurrency slumped as much as 17 percent to $45,000 on Tuesday, sparking concerns from investors over...

Read MoreRead more about Bitcoin Slips 17% to $45,000 as Caution Sweeps Over Crypto
ddos-distributed-denial-service-hackers-attack-d-rendered-illustration-72743778
  • News

Russia Accused by Ukraine for Major Cyber Attacks

February 25, 2021

 Ukraine on Monday alleged major attacks against the Ukrainian security and defense website by unidentified Russian Internet networks but did...

Read MoreRead more about Russia Accused by Ukraine for Major Cyber Attacks
car-438029_1920
  • News

FedEx and DHL Express Hit with Phishing Attacks

February 25, 2021

 Researchers reported on Tuesday that they discovered two email phishing assaults targeting at least 10,000 mailboxes at FedEx and DHL...

Read MoreRead more about FedEx and DHL Express Hit with Phishing Attacks
BlackMamba_1
  • Tools

BlackMamba – C2/post-exploitation Framework

February 25, 2021

BlackMamba is a multi client C2/post exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework. Some...

Read MoreRead more about BlackMamba – C2/post-exploitation Framework
BugBountyScanner
  • Tools

BugBountyScanner – A Bash Script And Docker Image For Bug Bounty Reconnaissance

February 25, 2021

A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information...

Read MoreRead more about BugBountyScanner – A Bash Script And Docker Image For Bug Bounty Reconnaissance
vmware
  • News

VMware vCenter Server CVE-2021-21972 Remote Code Execution Vulnerability: What You Need to Know

February 25, 2021

This blog post was co-authored by Bob Rudis and Caitlin Condon. What’s up?On Feb. 23, 2021, VMware published an advisory...

Read MoreRead more about VMware vCenter Server CVE-2021-21972 Remote Code Execution Vulnerability: What You Need to Know
Software-Engineering-Vulnerability-and-Risk-Management-Revolutionizing-the-Security-Landscape-at-Rapid7-2
  • News

Software Engineering, Vulnerability and Risk Management: Revolutionizing the Security Landscape at Rapid7

February 25, 2021

Do you know about CVE-2013-4866? No? It details a hardcoded PIN in a Smart Bidet giving attackers access to the...

Read MoreRead more about Software Engineering, Vulnerability and Risk Management: Revolutionizing the Security Landscape at Rapid7
osint
  • News

APT32 state hackers target human rights defenders with spyware

February 24, 2021

Vietnam-linked APT32 group targeted Vietnamese human rights defenders (HRDs) between February 2018 and November 2020. Vietnam-linked APT32 (aka Ocean Lotus)...

Read MoreRead more about APT32 state hackers target human rights defenders with spyware
osint
  • News

Airplane manufacturer Bombardier has disclosed a security breach, data leaked online

February 24, 2021

Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers...

Read MoreRead more about Airplane manufacturer Bombardier has disclosed a security breach, data leaked online
osint
  • News

VMware addresses a critical RCE issue in vCenter Server

February 24, 2021

VMware addressed a critical remote code execution flaw, tracked as CVE-2021-21972, in vCenter Server virtual infrastructure management platform. VMware has...

Read MoreRead more about VMware addresses a critical RCE issue in vCenter Server
osint
  • News

Twitter removes 100 accounts linked to Russia disseminating disinformation

February 24, 2021

Twitter removed dozens of accounts allegedly used by Russia-linked threat actors to disseminate disinformation and target western countries. Twitter has...

Read MoreRead more about Twitter removes 100 accounts linked to Russia disseminating disinformation
osint
  • News

IBM addressed flaws in Java Runtime, Planning Analytics Workspace, Kenexa LMS

February 24, 2021

IBM has released security patches to address high- and medium-severity vulnerabilities impacting some of its enterprise solutions.  IBM has released...

Read MoreRead more about IBM addressed flaws in Java Runtime, Planning Analytics Workspace, Kenexa LMS
CVE-prog
  • Vulnerabilities

CVE-2020-24606

February 24, 2021

Summary: Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all...

Read MoreRead more about CVE-2020-24606
CVE-prog
  • Vulnerabilities

CVE-2021-0351

February 24, 2021

Summary: In wlan driver, there is a possible system crash due to a missing bounds check. This could lead to...

Read MoreRead more about CVE-2021-0351
CVE-prog
  • Vulnerabilities

CVE-2021-27097

February 24, 2021

Summary: The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT. Reference Links(if available): https://github.com/u-boot/u-boot/commit/6f3c2d8aa5e6cbd80b5e869bbbddecb66c329d01 https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0 https://github.com/u-boot/u-boot/commit/8a7d4cf9820ea16fabd25a6379351b4dc291204b CVSS...

Read MoreRead more about CVE-2021-27097
CVE-prog
  • Vulnerabilities

CVE-2021-27138

February 24, 2021

Summary: The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT. Reference Links(if available):...

Read MoreRead more about CVE-2021-27138
CVE-prog
  • Vulnerabilities

CVE-2021-23839

February 24, 2021

Summary: OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support...

Read MoreRead more about CVE-2021-23839
6471dc0f-9ba1-41f3-bcc0-cc6ae2acc5d0-600x488-1
  • News

Clop targets execs, ransomware tactics get another new twist

February 24, 2021

Ransomware peddlers have come up with yet another devious twist on the recent trend for data exfiltration. After interviewing several...

Read MoreRead more about Clop targets execs, ransomware tactics get another new twist
SilverSparrow_installer-600x424-1
  • News

The mystery of the Silver Sparrow Mac malware

February 24, 2021

Cyber security company Red Canary published findings last week about a new piece of Mac malware called Silver Sparrow. This...

Read MoreRead more about The mystery of the Silver Sparrow Mac malware
smartphone-1735044_1280
  • News

The Russian created Clubhouse for Android in one day

February 24, 2021

The former developer of the Android version of the application of the Russian social network VKontakte Grigory Klyushnikov created Clubhouse...

Read MoreRead more about The Russian created Clubhouse for Android in one day
pexels-tima-miroshnichenko-5380641-2
  • News

Malwarebytes Report Confirms the Change in Tactics of Cybercriminals During Covid-19

February 24, 2021

 Malwarebytes, an American security firm announced the findings of its annual ‘State of Malware’ report, this report explored the working...

Read MoreRead more about Malwarebytes Report Confirms the Change in Tactics of Cybercriminals During Covid-19
pexels-lisa-fotios-1092644
  • News

Alert for Smart Phone Users, How Their Data is Extracted by Apps Via Location Tracking

February 24, 2021

 With more mobile apps entering the new world of smartphone users, only a few know about the dangers of the...

Read MoreRead more about Alert for Smart Phone Users, How Their Data is Extracted by Apps Via Location Tracking
hacker-1725256_1920
  • News

Chinese Hackers Cloned Exploit Tool Belonging to NSA

February 24, 2021

 A Chinese hacking group allegedly "cloned" and deployed a zero-day exploit created by the U.S. National Security Agency's Equation Group...

Read MoreRead more about Chinese Hackers Cloned Exploit Tool Belonging to NSA

Posts pagination

Previous 1 … 3,898 3,899 3,900 3,901 3,902 3,903 3,904 … 4,068 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-3528

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-13961

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3897

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-13962

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-9524

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel