Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
matrix-5028024_1920
  • News

Domestic Kitten – An Iranian Surveillance Operation

February 9, 2021

 Check Point researchers as of late revealed the full degree of Domestic Kitten's broad surveillance operation against Iranian residents that...

Read MoreRead more about Domestic Kitten – An Iranian Surveillance Operation
osint
  • News

Experts Confirm Shady Ransomware Business, Block-chain Transactions on Rise

February 9, 2021

 Chainalysis, a blockchain investment firm, recently published a report that confirms that ransomware operating cybercrime groups don't always work in...

Read MoreRead more about Experts Confirm Shady Ransomware Business, Block-chain Transactions on Rise
sylvain-thrd-L6WY8VY7k7s-unsplash
  • News

Nespresso Prepaid Vending Machines Hacked by a Belgian Researcher for Free Coffee

February 9, 2021

 Polle Vanhoof, a Belgian cybersecurity researcher discovered there a flaw in the older Nespresso prepaid coffee machine smart cards and...

Read MoreRead more about Nespresso Prepaid Vending Machines Hacked by a Belgian Researcher for Free Coffee
security-protection-anti-virus-software-60504-1
  • News

Plex Media Servers Actively Abused To Amplify DDoS Attacks

February 9, 2021

Research workers with NetScout's Atlas Security Engineering and Response Team have warned against the threat actors campaign, they said that...

Read MoreRead more about Plex Media Servers Actively Abused To Amplify DDoS Attacks
istockphoto-1144604245-170667a
  • News

Hackers Used Internet Explorer Zero-Day Vulnerability To Target Security Researchers

February 9, 2021

 In recent times, during the attacks against the security and vulnerability researchers in North Korea, an Internet Explorer zero-day vulnerability...

Read MoreRead more about Hackers Used Internet Explorer Zero-Day Vulnerability To Target Security Researchers
wifi-password_1_demo
  • Tools

Wifi-Password – Quickly Fetch Your WiFi Password And If Needed, Generate A QR Code Of Your WiFi To Allow Phones To Easily Connect

February 9, 2021

Quickly fetch your WiFi password and if needed, generate a QR code of your WiFi to allow phones to easily...

Read MoreRead more about Wifi-Password – Quickly Fetch Your WiFi Password And If Needed, Generate A QR Code Of Your WiFi To Allow Phones To Easily Connect
ditto
  • Tools

Ditto – A Tool For IDN Homograph Attacks And Detection

February 9, 2021

Ditto is a small tool that accepts a domain name as input and generates all its variants for an homograph...

Read MoreRead more about Ditto – A Tool For IDN Homograph Attacks And Detection
osint
  • News

Domestic Kitten has been conducting surveillance targeting over 1,000 individuals

February 8, 2021

Iran-linked APT group Domestic Kitten, also tracked as APT-C-50, has been conducting widespread surveillance targeting over 1,000 individuals. Domestic Kitten,...

Read MoreRead more about Domestic Kitten has been conducting surveillance targeting over 1,000 individuals
osint
  • News

Novel phishing technique uses Morse code to compose malicious URLs

February 8, 2021

Cybercriminals devised a new phishing technique that leverages the Morse code to hide malicious URLs and bypass defense. Experts spotted...

Read MoreRead more about Novel phishing technique uses Morse code to compose malicious URLs
osint
  • News

Victims of Ziggy ransomware can recover their files for free

February 8, 2021

The Ziggy ransomware gang has shut down its operations and released the decryption keys fearing the ongoing investigation of law enforcement....

Read MoreRead more about Victims of Ziggy ransomware can recover their files for free
osint
  • News

COMB breach: 3.2B email and password pairs leaked online

February 8, 2021

The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on a popular...

Read MoreRead more about COMB breach: 3.2B email and password pairs leaked online
osint
  • News

Hacking Nespresso machines to have unlimited funds to purchase coffee

February 8, 2021

Some commercial Nespresso machines that are used in Europe could be hacked to add unlimited funds to purchase coffee. Some...

Read MoreRead more about Hacking Nespresso machines to have unlimited funds to purchase coffee
CVE-prog
  • Vulnerabilities

CVE-2020-36225

February 8, 2021

Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo...

Read MoreRead more about CVE-2020-36225
CVE-prog
  • Vulnerabilities

CVE-2020-36224

February 8, 2021

Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the...

Read MoreRead more about CVE-2020-36224
CVE-prog
  • Vulnerabilities

CVE-2020-36223

February 8, 2021

Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control...

Read MoreRead more about CVE-2020-36223
CVE-prog
  • Vulnerabilities

CVE-2020-36222

February 8, 2021

Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation,...

Read MoreRead more about CVE-2020-36222
CVE-prog
  • Vulnerabilities

CVE-2020-36221

February 8, 2021

Summary: An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing,...

Read MoreRead more about CVE-2020-36221
fbi-3026206_960_720
  • News

Operation LadyBird: International Law Enforcement Agencies Crackdown Emotet

February 8, 2021

 European and US law agencies earlier this week directed a brilliant crackdown on Emotet. Emotet is a botnet of corrupted...

Read MoreRead more about Operation LadyBird: International Law Enforcement Agencies Crackdown Emotet
pexels-photo-5380605-1
  • News

Webdev Tutorials Site ‘SitePoint’ has Disclosed a Data Breach

February 8, 2021

  The website Sitepoint, which provides access to online study and information on web development content tutorials and books, reported...

Read MoreRead more about Webdev Tutorials Site ‘SitePoint’ has Disclosed a Data Breach
adi-goldstein-EUsVwEOsblE-unsplash
  • News

SolarWinds CEO: “SolarWinds Orion Development Program was Exploited by the Hackers”

February 8, 2021

 Sudhakar Ramakrishna, CEO of SolarWinds confirmed that ‘suspicious activity’ was spotted in its Office 365 environment which permitted threat actors...

Read MoreRead more about SolarWinds CEO: “SolarWinds Orion Development Program was Exploited by the Hackers”
google-939112_1920
  • News

Malicious Operations Hide Under The Google Chrome Sync Feature

February 8, 2021

 Lately, the threat actors have detected a technique where they can use the sync feature of Google Chrome to transmit...

Read MoreRead more about Malicious Operations Hide Under The Google Chrome Sync Feature
google-485611_1920
  • News

Microsoft Office Phishing Attack Hosted on Google Firebase

February 8, 2021

 A phishing campaign set on stealing Microsoft login credentials is utilizing Google Firebase to bypass email security efforts in Microsoft...

Read MoreRead more about Microsoft Office Phishing Attack Hosted on Google Firebase
COM-Code-Helper_1_COM-Code-Before-After-1
  • Tools

COM-Code-Helper – Two IDAPython Scripts Help You To Reconstruct Microsoft COM (Component Object Model) Code

February 8, 2021

Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code Especially malware reversers will find this useful,...

Read MoreRead more about COM-Code-Helper – Two IDAPython Scripts Help You To Reconstruct Microsoft COM (Component Object Model) Code
creepy_2_multiple_markers
  • Tools

Creepy – A Geolocation OSINT Tool. Offers Geolocation Information Gathering Through Social Networking Platforms

February 8, 2021

This project is currently not maintained. I haven't put any work on it since 2016 and with the current state...

Read MoreRead more about Creepy – A Geolocation OSINT Tool. Offers Geolocation Information Gathering Through Social Networking Platforms

Posts pagination

Previous 1 … 3,909 3,910 3,911 3,912 3,913 3,914 3,915 … 4,066 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2024-13793

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3419

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-32873

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4127

May 10, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 150[.]158[.]108[.]220:443

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel