Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
rene-deanda-zfKlCKK-Ql0-unsplash
  • News

White House Directs Federal Agencies to Improve Logging Capabilities

September 3, 2021

 The White House has directed federal agencies to improve their logging capabilities in order to accelerate cybersecurity incident response, according...

Read MoreRead more about White House Directs Federal Agencies to Improve Logging Capabilities
pexels-sora-shimazaki-59357912B252812529
  • News

Hackers are Selling Tool to Hide Malware in GPUs

September 3, 2021

 Cybercriminals are moving towards malware attacks that can execute code from a hacked system's graphics processing unit (GPU). Although the...

Read MoreRead more about Hackers are Selling Tool to Hide Malware in GPUs
sl_abstract_binary_wave-990x400-1
  • News

QakBot technical analysis

September 3, 2021

Main description QakBot, also known as QBot, QuackBot and Pinkslipbot, is a banking Trojan that has existed for over a...

Read MoreRead more about QakBot technical analysis
osint
  • Tutorials

Community Contributors Program

September 3, 2021

Now that Defcon and Blackhat are checked off for the year, we can get back to real work the fun...

Read MoreRead more about Community Contributors Program
Outlook
  • Tools

KnockOutlook – A Little Tool To Play With Outlook

September 3, 2021

"The best feeling is to win by knockout." - Nonito Donaire OverviewKnockOutlook is a C# project that interacts with Outlook's...

Read MoreRead more about KnockOutlook – A Little Tool To Play With Outlook
hash
  • Tools

Assless-Chaps – Crack MSCHAPv2 Challenge/Responses Quickly Using A Database Of NT Hashes

September 3, 2021

Crack MSCHAPv2/NTLMv1 challenge/responses quickly using a database of NT hashes IntroductionAssless CHAPs is an efficient way to recover the NT...

Read MoreRead more about Assless-Chaps – Crack MSCHAPv2 Challenge/Responses Quickly Using A Database Of NT Hashes
1f1e8-1f1f3-1
  • News

Attackers are attempting to exploit recently patched Atlassian Confluence CVE-2021-26084 RCE

September 2, 2021

Threat actors are actively exploiting a recently patched vulnerability in Atlassian’s Confluence enterprise collaboration product. Threat actors were spotted exploiting...

Read MoreRead more about Attackers are attempting to exploit recently patched Atlassian Confluence CVE-2021-26084 RCE
osint
  • News

Cyber Defense Magazine – September 2021 has arrived. Enjoy it!

September 2, 2021

Cyber Defense Magazine September 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with 161 pages of excellent...

Read MoreRead more about Cyber Defense Magazine – September 2021 has arrived. Enjoy it!
osint
  • News

Cisco fixes a critical flaw in Enterprise NFVIS for which PoC exploit exists

September 2, 2021

Cisco released patches for a critical authentication bypass issue in Enterprise NFV Infrastructure Software (NFVIS) for which PoC exploit code...

Read MoreRead more about Cisco fixes a critical flaw in Enterprise NFVIS for which PoC exploit exists
osint
  • News

Google paid over $130K in bounty rewards for the issues addressed with the release of Chrome 93

September 2, 2021

Google announced the release of Chrome 93 that addresses 27 security vulnerabilities, 19 issues were reported through its bug bounty...

Read MoreRead more about Google paid over $130K in bounty rewards for the issues addressed with the release of Chrome 93
osint
  • News

Mozi infections will slightly decrease but it will stay alive for some time to come

September 2, 2021

The Mozi botnet continues to spread despite the arrest of its alleged author and experts believe that it will run...

Read MoreRead more about Mozi infections will slightly decrease but it will stay alive for some time to come
osint
  • News

QNAP will patche OpenSSL flaws in its NAS devices

September 2, 2021

Network-attached storage (NAS) appliance maker QNAP is working on security patches for its products affected by recently fixed OpenSSL flaws. Taiwanese...

Read MoreRead more about QNAP will patche OpenSSL flaws in its NAS devices
CVE-prog
  • Vulnerabilities

CVE-2021-3682

September 2, 2021

Summary: A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs...

Read MoreRead more about CVE-2021-3682
CVE-prog
  • Vulnerabilities

CVE-2021-1523

September 2, 2021

Summary: A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated,...

Read MoreRead more about CVE-2021-1523
CVE-prog
  • Vulnerabilities

CVE-2021-1523

September 2, 2021

Summary: A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated,...

Read MoreRead more about CVE-2021-1523
CVE-prog
  • Vulnerabilities

CVE-2021-24580

September 2, 2021

Summary: The Side Menu Lite WordPress plugin before 2.2.6 does not sanitise user input from the List page in the...

Read MoreRead more about CVE-2021-24580
CVE-prog
  • Vulnerabilities

CVE-2021-38714

September 2, 2021

Summary: In Plib through 1.85, there is an integer overflow vulnerability that could result in arbitrary code execution. The vulnerability...

Read MoreRead more about CVE-2021-38714
CVE-prog
  • Vulnerabilities

CVE-2017-16875

September 2, 2021

Summary: An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. The ioqueue component may issue...

Read MoreRead more about CVE-2017-16875
osint
  • News

FTC bans SpyFone and its CEO from continuing to sell stalkerware

September 2, 2021

Nearly two years after the US Federal Trade Commission first took aim against mobile apps that can non-consensually track people’s...

Read MoreRead more about FTC bans SpyFone and its CEO from continuing to sell stalkerware
PlayStore-600x83-1
  • News

Google Play sign-ins can be abused to track another person’s movements

September 2, 2021

Even people that have been involved in cybersecurity for over 20 years make mistakes. I’m not sure whether that is...

Read MoreRead more about Google Play sign-ins can be abused to track another person’s movements
ReceiverHelper-will-damage-your-computer
  • News

Macs turn on apps signed by Symantec, treat them as malware

September 2, 2021

On August 23, following an update to Apple’s XProtect system—one of the security features built into macOS—some Mac users began...

Read MoreRead more about Macs turn on apps signed by Symantec, treat them as malware
android-4412596_1280
  • News

Kaspersky Lab has reported about Android viruses designed to steal money automatically

September 2, 2021

Viktor Chebyshev, a leading researcher of mobile threats at Kaspersky Lab, spoke in an interview with Russian newspaper Izvestia about...

Read MoreRead more about Kaspersky Lab has reported about Android viruses designed to steal money automatically
anonymous-studio-figure-photography-facial-mask-38275
  • News

Experts Find Vulnerabilities in AMD Zen Processor

September 2, 2021

 German cybersecurity experts at TU Dresden discovered that Zen processor of AMD is susceptible to data-bothering meltdown like attacks in...

Read MoreRead more about Experts Find Vulnerabilities in AMD Zen Processor
pexels-tima-miroshnichenko-5380641
  • News

Do Not Use Single-Factor Authentication on Internet-Exposed Systems, CISA Warns

September 2, 2021

 The US Cybersecurity and Infrastructure Security Agency (CISA) this week added single-factor authentication (SFA) to a very short list of...

Read MoreRead more about Do Not Use Single-Factor Authentication on Internet-Exposed Systems, CISA Warns

Posts pagination

Previous 1 … 3,910 3,911 3,912 3,913 3,914 3,915 3,916 … 4,247 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: IMSSA Manufacturing

July 16, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Morrison Companies

July 16, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Warisan TC Holdings Berhad

July 16, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Tra ***

July 16, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Tan Chong Motor Holdings Berhad

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel