Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2021-3489

September 14, 2021

Summary: The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than...

Read MoreRead more about CVE-2021-3489
CVE-prog
  • Vulnerabilities

CVE-2021-3490

September 14, 2021

Summary: The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly...

Read MoreRead more about CVE-2021-3490
CVE-prog
  • Vulnerabilities

CVE-2021-3490

September 14, 2021

Summary: The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly...

Read MoreRead more about CVE-2021-3490
CVE-prog
  • Vulnerabilities

CVE-2021-3490

September 14, 2021

Summary: The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly...

Read MoreRead more about CVE-2021-3490
CVE-prog
  • Vulnerabilities

CVE-2021-3491

September 14, 2021

Summary: The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which...

Read MoreRead more about CVE-2021-3491
CVE-prog
  • Vulnerabilities

CVE-2021-31969

September 14, 2021

Summary: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31969 https://www.zerodayinitiative.com/advisories/ZDI-21-797/ CVSS Score (if available)...

Read MoreRead more about CVE-2021-31969
cyber-security-1805632_1280
  • Vulnerabilities

CVE-2021-30860 – Apple / Multiple – Integer overflow

September 14, 2021

Summary: CVE-2021-30860 is an integer overflow vulnerability impacting Apple macOS Catalina, Apple macOS Big Sur versions 11.5.2 and earlier, Apple...

Read MoreRead more about CVE-2021-30860 – Apple / Multiple – Integer overflow
Flowspec_OVH_maltego_
  • News

The many tentacles of Magecart Group 8

September 14, 2021

This blog post was authored by Jérôme Segura During the past couple of years online shopping has continued to increase...

Read MoreRead more about The many tentacles of Magecart Group 8
osint
  • News

Backups are not a simple ransomware defense, with Matt Crape: Lock and Code S02E17

September 14, 2021

A recent spate of ransomware attacks in the US and abroad have derailed major corporations, spurring a fuel shortage on...

Read MoreRead more about Backups are not a simple ransomware defense, with Matt Crape: Lock and Code S02E17
osint
  • News

A week in security (Sept 6 – Sept 12)

September 14, 2021

Last week on Malwarebytes Labs Apple delays plans to search devices for child abuse imagery.ProtonMail hands user’s IP address and...

Read MoreRead more about A week in security (Sept 6 – Sept 12)
adi-goldstein-EUsVwEOsblE-unsplash-1
  • News

GitHub Identifies Multiple Security Vulnerabilities in Node.js Packages

September 14, 2021

 Cybersecurity researchers at GitHub have uncovered arbitrary code execution vulnerabilities in the open-source Node.js packages, "tar" and "@npmcli/arborist,". The tar package...

Read MoreRead more about GitHub Identifies Multiple Security Vulnerabilities in Node.js Packages
tesla-1724773_1920
  • News

TESLA FSD Beta Software Leaked Days Before the Release of Version 10

September 14, 2021

 Full Self Driving (FSD) beta software of the TESLA car has been leaked, and it is circulated in and around...

Read MoreRead more about TESLA FSD Beta Software Leaked Days Before the Release of Version 10
pexels-nothing-ahead-45673392B252822529
  • News

Microsoft Alerted Azure Customers of Bug That Could Have Allowed Hackers to Access Data

September 14, 2021

 Microsoft alerted some Azure cloud computing users that a vulnerability uncovered by security experts might have given hackers access to...

Read MoreRead more about Microsoft Alerted Azure Customers of Bug That Could Have Allowed Hackers to Access Data
flag-1192635_1920
  • News

Scammers in Russia Offer Free Bitcoin on a Hacked Government Website

September 14, 2021

 The website of the Russian government was recently hacked. The fraudsters started a phoney Bitcoin (BTC) scheme, which they then...

Read MoreRead more about Scammers in Russia Offer Free Bitcoin on a Hacked Government Website
fintech_abstract-990x400-1
  • News

Incident response analyst report 2020

September 14, 2021

 Download full report (PDF) The Incident response analyst report provides insights into incident investigation services conducted by Kaspersky in 2020....

Read MoreRead more about Incident response analyst report 2020
CISA_Logo
  • News

US-CERT Bulletin (SB21-256):Vulnerability Summary for the Week of September 6, 2021

September 14, 2021

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...

Read MoreRead more about US-CERT Bulletin (SB21-256):Vulnerability Summary for the Week of September 6, 2021
peirates_1_peirates_logo-783044
  • Tools

Peirates – Kubernetes Penetration Testing Tool

September 14, 2021

What is Peirates?Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It...

Read MoreRead more about Peirates – Kubernetes Penetration Testing Tool
gokart_1_logo-770328
  • Tools

Gokart – A Static Analysis Tool For Securing Go Code

September 14, 2021

GoKart is a static analysis tool for Go that finds vulnerabilities using the SSA (single static assignment) form of Go...

Read MoreRead more about Gokart – A Static Analysis Tool For Securing Go Code
osint
  • News

New Spook.Js attack allows to bypass Google Chrome Site Isolation protections

September 13, 2021

Spook.js is a new side-channel attack on modern processors that can allow bypassing Site Isolation protections implemented in Google Chrome. Boffins...

Read MoreRead more about New Spook.Js attack allows to bypass Google Chrome Site Isolation protections
osint
  • News

BlackMatter ransomware gang hit Technology giant Olympus

September 13, 2021

Technology giant Olympus announced it was the victim of a ransomware attack and is currently investigating the extent of the...

Read MoreRead more about BlackMatter ransomware gang hit Technology giant Olympus
osint
  • News

The new maxtrilha trojan is being disseminated and targeting several banks

September 13, 2021

A new banking trojan dubbed maxtrilha (due to its encryption key) has been discovered in the last few days and targeting customers...

Read MoreRead more about The new maxtrilha trojan is being disseminated and targeting several banks
osint
  • News

Department of Justice and Constitutional Development of South Africa hit by a ransomware attack

September 13, 2021

The Department of Justice and Constitutional Development of South Africa was hit by a ransomware attack that crippled bail services....

Read MoreRead more about Department of Justice and Constitutional Development of South Africa hit by a ransomware attack
osint
  • News

Google implements new Private Compute Services for Android

September 13, 2021

Google introduces Private Compute Services, a collection of services aimed at designing to improve privacy in the Android operating system....

Read MoreRead more about Google implements new Private Compute Services for Android
CVE-prog
  • Vulnerabilities

CVE-2021-0586

September 13, 2021

Summary: In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device...

Read MoreRead more about CVE-2021-0586

Posts pagination

Previous 1 … 3,904 3,905 3,906 3,907 3,908 3,909 3,910 … 4,251 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: KEP Credit Union KEP

July 17, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Sib-Tryck Holding

July 17, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Fayrefield Foods

July 17, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Multilift Logistic Group

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3871

July 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel