Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
vpn-4046047_1920
  • News

VIP72: 15-Year-Old Malware Proxy Network Goes ‘Dark’ Without Notice

September 4, 2021

A 15-year-old cybercrime anonymity service called VIP72, in the past, allowed a large number of cybercriminals to cover up their...

Read MoreRead more about VIP72: 15-Year-Old Malware Proxy Network Goes ‘Dark’ Without Notice
sl_abstract_nodes-990x400-1
  • News

Applied YARA training Q&A

September 4, 2021

Introduction On August 31, 2021 we ran a joint webinar between VirusTotal and Kaspersky, with a focus on YARA rules...

Read MoreRead more about Applied YARA training Q&A
CobaltStrike
  • Tools

CobaltStrikeParser – Python parser for CobaltStrike Beacon’s configuration

September 4, 2021

Python parser for CobaltStrike Beacon's configuration DescriptionUse parse_beacon_config.py for stageless beacons, memory dumps or C2 urls with metasploit compatibility mode...

Read MoreRead more about CobaltStrikeParser – Python parser for CobaltStrike Beacon’s configuration
mobileAudit_1_mobile_audit-763706
  • Tools

MobileAudit – SAST and Malware Analysis for Android Mobile APKs

September 4, 2021

Django Web application for performing Static Analysis and detecting malware in Android APKsIn each of the scans, it would have...

Read MoreRead more about MobileAudit – SAST and Malware Analysis for Android Mobile APKs
lockbit_logo
  • Data Breach
  • Ransomware

LockBit 2.0 Ransomware Victim: pulmuonewildwood[.]com

September 3, 2021

LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...

Read MoreRead more about LockBit 2.0 Ransomware Victim: pulmuonewildwood[.]com
image-3
  • News
  • Ransomware

LockBit 2.0 Ransomware add DDoS protection to victim blog

September 3, 2021

The ransomware group have added DDoS protection to the victim blog using Nginx-Lua-Anti-DDoS from the github repo located here: https://github.com/C0nw0nk/Nginx-Lua-Anti-DDoS/blob/master/lua/anti_ddos_challenge.lua...

Read MoreRead more about LockBit 2.0 Ransomware add DDoS protection to victim blog
osint
  • News

PRIVATELOG, a new malware that leverages Common Log File System (CLFS) to avoid detection

September 3, 2021

Mandiant researchers spotted a new malware family, dubbed PRIVATELOG, that relies on the Common Log File System (CLFS) to evade...

Read MoreRead more about PRIVATELOG, a new malware that leverages Common Log File System (CLFS) to avoid detection
osint
  • News

FBI warns of ransomware attacks targeting the food and agriculture sector

September 3, 2021

FBI warns ransomware gangs are actively targeting organizations in the food and agriculture sector. The FBI Cyber Division issued a...

Read MoreRead more about FBI warns of ransomware attacks targeting the food and agriculture sector
osint
  • News

Attacks against SolarWinds Serv-U SW were possible due to the lack of ASLR mitigation

September 3, 2021

SolarWinds did not enable anti-exploit mitigation available since 2006 allowing threat actors to target SolarWinds Serv-U FTP software in July...

Read MoreRead more about Attacks against SolarWinds Serv-U SW were possible due to the lack of ASLR mitigation
osint
  • News

WhatsApp CVE-2020-1910 bug could have led to user data exposure

September 3, 2021

The now-fixed CVE-2020-1910 vulnerability in WhatApp ‘s image filter feature could have exposed user data to remote attackers. A high-severity...

Read MoreRead more about WhatsApp CVE-2020-1910 bug could have led to user data exposure
osint
  • News

New BrakTooth flaws potentially impact millions of Bluetooth-enabled devices

September 3, 2021

Security flaws in commercial Bluetooth stacks dubbed BrakTooth can be exploited by threat actors to execute arbitrary code and crash...

Read MoreRead more about New BrakTooth flaws potentially impact millions of Bluetooth-enabled devices
blm_logo
  • Data Breach
  • Ransomware

BlackMatter Ransomware Victim: Solar Coca-Cola

September 3, 2021

BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...

Read MoreRead more about BlackMatter Ransomware Victim: Solar Coca-Cola
CVE-prog
  • Vulnerabilities

CVE-2021-3682

September 3, 2021

Summary: A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs...

Read MoreRead more about CVE-2021-3682
CVE-prog
  • Vulnerabilities

CVE-2021-3713

September 3, 2021

Summary: An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior...

Read MoreRead more about CVE-2021-3713
CVE-prog
  • Vulnerabilities

CVE-2021-3713

September 3, 2021

Summary: An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior...

Read MoreRead more about CVE-2021-3713
CVE-prog
  • Vulnerabilities

CVE-2021-1588

September 3, 2021

Summary: A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated,...

Read MoreRead more about CVE-2021-1588
CVE-prog
  • Vulnerabilities

CVE-2021-33007

September 3, 2021

Summary: A heap-based buffer overflow in Delta Electronics TPEditor: v1.98.06 and prior may be exploited by processing a specially crafted...

Read MoreRead more about CVE-2021-33007
CVE-prog
  • Vulnerabilities

CVE-2021-33019

September 3, 2021

Summary: A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft Version 4.00.11 and prior may be exploited by processing a...

Read MoreRead more about CVE-2021-33019
osint
  • News

WhatsApp hit with €225 million fine for GDPR violations

September 3, 2021

WhatsApp was hit with a €225 million fine for violating the General Data Protection Regulation (GDPR), the European Union’s sweeping...

Read MoreRead more about WhatsApp hit with €225 million fine for GDPR violations
osint
  • News

Vulnerable WordPress plugin leaves online shoppers vulnerable

September 3, 2021

The most popular web content management system (CMS) is WordPress, which is used by more than 30% of all websites....

Read MoreRead more about Vulnerable WordPress plugin leaves online shoppers vulnerable
osint
  • News

BrakTooth Bluetooth vulnerabilities, crash all the devices!

September 3, 2021

Security researchers have revealed details about a set of 16 vulnerabilities that impact the Bluetooth software stack that ships with...

Read MoreRead more about BrakTooth Bluetooth vulnerabilities, crash all the devices!
quantum-computer-3679893_1920
  • News

NSA Issues FAQs on Quantum Computing and Post-Quantum Cryptography

September 3, 2021

 As concerns regarding quantum computing and post-quantum cryptography are overtaking the forefront of cryptographic discussions, especially in areas associated with...

Read MoreRead more about NSA Issues FAQs on Quantum Computing and Post-Quantum Cryptography
infant-2709666_1280
  • News

The largest Internet companies of the Russian Federation signed the charter for the safety of children on the Internet

September 3, 2021

On Wednesday, September 1, Russian Internet companies, media holdings and telecom operators signed a charter on the safety of children...

Read MoreRead more about The largest Internet companies of the Russian Federation signed the charter for the safety of children on the Internet
Xhelper
  • News

US Government Comes Up With A Plan to Restrict Cyberattacks

September 3, 2021

 Ransomware attacks are at an all time high in the United States, hackers are disrupting computer systems administering crucial infrastructure...

Read MoreRead more about US Government Comes Up With A Plan to Restrict Cyberattacks

Posts pagination

Previous 1 … 3,909 3,910 3,911 3,912 3,913 3,914 3,915 … 4,247 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: IMSSA Manufacturing

July 16, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Morrison Companies

July 16, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Warisan TC Holdings Berhad

July 16, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Tra ***

July 16, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Tan Chong Motor Holdings Berhad

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel