Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2021-38585

August 21, 2021

Summary: The WHM Locale Upload feature in cPanel before 98.0.1 allows unserialization attacks (SEC-585). Reference Links(if available): https://docs.cpanel.net/changelogs/98-change-log/ CVSS Score...

Read MoreRead more about CVE-2021-38585
CVE-prog
  • Vulnerabilities

CVE-2021-38584

August 21, 2021

Summary: The WHM Locale Upload feature in cPanel before 98.0.1 allows XXE attacks (SEC-585). Reference Links(if available): https://docs.cpanel.net/changelogs/98-change-log/ CVSS Score...

Read MoreRead more about CVE-2021-38584
CVE-prog
  • Vulnerabilities

CVE-2021-29376

August 21, 2021

Summary: ircII before 20210314 allows remote attackers to cause a denial of service (segmentation fault and client crash, disconnecting the...

Read MoreRead more about CVE-2021-29376
osint
  • News

Largest DDoS attack ever reported gets hoovered up by Cloudflare

August 21, 2021

On the Cloudflare blog, the American web infrastructure behemoth that provides content delivery network (CDN) and DDoS mitigation services reports...

Read MoreRead more about Largest DDoS attack ever reported gets hoovered up by Cloudflare
osint
  • News

Confidential Terrorist Watchlist With 1.9Mn Records Exposed Online

August 21, 2021

 Cyber security researcher Bob Diachenko has unearthed an unsecured ElasticSearch server containing nearly two million terrorist watchlist records, including "no-fly" list...

Read MoreRead more about Confidential Terrorist Watchlist With 1.9Mn Records Exposed Online
osint
  • News

The Hacker Behind the Biggest Crypto Heist is Refusing to Return the Remaining Funds

August 21, 2021

 The Poly Network attack took place two weeks ago, but the narrative is far from finished. Mr. White Hat, an...

Read MoreRead more about The Hacker Behind the Biggest Crypto Heist is Refusing to Return the Remaining Funds
osint
  • News

Belarus Organizations are Being Targeted by Cyber Partisan

August 21, 2021

 A clandestine hacking organization successfully attacked both the government of Belarus and their Police, which provided these criminals with access...

Read MoreRead more about Belarus Organizations are Being Targeted by Cyber Partisan
bitcoin-3290060_1920
  • News

Google Play is Infested with Fake Crypto Mining Apps

August 21, 2021

 Google has deleted eight bogus mobile apps from the Play Store that pretend to be bitcoin cloud-mining apps but are...

Read MoreRead more about Google Play is Infested with Fake Crypto Mining Apps
PackageDNA
  • Tools

PackageDNA – Tool To Analyze Software Packages Of Different Programming Languages That Are Being Or Will Be Used In Their Codes

August 21, 2021

This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being...

Read MoreRead more about PackageDNA – Tool To Analyze Software Packages Of Different Programming Languages That Are Being Or Will Be Used In Their Codes
FisherMan_4_template-778269
  • Tools

FisherMan – CLI Program That Collects Information From Facebook User Profiles Via Selenium

August 21, 2021

Search for public profile information on FacebookInstallation# clone the repo$ git clone https://github.com/Godofcoffe/FisherMan# change the working directory to FisherMan$ cd...

Read MoreRead more about FisherMan – CLI Program That Collects Information From Facebook User Profiles Via Selenium
osint
  • News

Internet Systems Consortium (ISC) fixes High-Severity DoS flaw in BIND DNS Software

August 20, 2021

The Internet Systems Consortium (ISC) addressed a high-severity denial-of-service (DoS) flaw (CVE-2021-25218) affecting the BIND DNS software. The Internet Systems...

Read MoreRead more about Internet Systems Consortium (ISC) fixes High-Severity DoS flaw in BIND DNS Software
osint
  • News

Mozi P2P Botnet also targets Netgear, Huawei, and ZTE devices

August 20, 2021

Mozi botnet continues to evolve, its authors implemented new capabilities to target Netgear, Huawei, and ZTE network gateways. Microsoft researchers...

Read MoreRead more about Mozi P2P Botnet also targets Netgear, Huawei, and ZTE devices
osint
  • News

Cisco warns of Server Name Identification data exfiltration flaw in multiple products

August 20, 2021

Unauthenticated attackers could bypass TLS inspection filtering solution in multiple products to exfiltrate data from previously compromised servers, Cisco warns....

Read MoreRead more about Cisco warns of Server Name Identification data exfiltration flaw in multiple products
osint
  • News

637 flaws in industrial control system (ICS) products were published in H1 2021

August 20, 2021

During the first half of 2021, 637 vulnerabilities affecting industrial control system (ICS) products were published, affecting products from 76...

Read MoreRead more about 637 flaws in industrial control system (ICS) products were published in H1 2021
osint
  • News

Threat actors stole $97 million from Liquid cryptocurency exchange

August 20, 2021

Japanese cryptocurrency exchange Liquid was hit by a cyber attack, threat actors stole $97 Million worth of crypto-currency assets from...

Read MoreRead more about Threat actors stole $97 million from Liquid cryptocurency exchange
osint
  • News

Cisco will not patch critical flaw CVE-2021-34730 in EoF routers

August 20, 2021

Cisco has no plan to fix a critical code execution flaw (CVE-2021-34730) in small business RV110W, RV130, RV130W, and RV215W...

Read MoreRead more about Cisco will not patch critical flaw CVE-2021-34730 in EoF routers
CVE-prog
  • Vulnerabilities

CVE-2021-31292

August 20, 2021

Summary: An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a...

Read MoreRead more about CVE-2021-31292
CVE-prog
  • Vulnerabilities

CVE-2021-1106

August 20, 2021

Summary: NVIDIA Linux kernel distributions contain a vulnerability in nvmap, where writes may be allowed to read-only buffers, which may...

Read MoreRead more about CVE-2021-1106
CVE-prog
  • Vulnerabilities

CVE-2020-28052

August 20, 2021

Summary: An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method...

Read MoreRead more about CVE-2020-28052
CVE-prog
  • Vulnerabilities

CVE-2021-38592

August 20, 2021

Summary: Wasm3 0.5.0 has a heap-based buffer overflow in op_Const64 (called from EvaluateExpression and m3_LoadModule). Reference Links(if available): https://github.com/google/oss-fuzz-vulns/blob/main/vulns/wasm3/OSV-2021-676.yaml https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33554...

Read MoreRead more about CVE-2021-38592
CVE-prog
  • Vulnerabilities

CVE-2021-38380

August 20, 2021

Summary: Live555 through 1.08 mishandles huge requests for the same MP3 stream, leading to recursion and s stack-based buffer over-read....

Read MoreRead more about CVE-2021-38380
CVE-prog
  • Vulnerabilities

CVE-2020-7246 – qdPM / qdPM – Unrestricted file upload

August 20, 2021

Summary: CVE-2020-7246 is an unrestricted file upload vulnerability impacting qdPM versions 9.1 and earlier. An exploit was observed in open...

Read MoreRead more about CVE-2020-7246 – qdPM / qdPM – Unrestricted file upload
osint
  • News

Cisco Small Business routers vulnerable to remote attacks, won’t get a patch

August 20, 2021

In a security advisory, Cisco has informed users that a vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small...

Read MoreRead more about Cisco Small Business routers vulnerable to remote attacks, won’t get a patch
osint
  • News

T-Mobile customers, change your PINs

August 20, 2021

At the end of last week, T-Mobile was investigating reports of a “massive” customer data breach. A hacker claimed to stolen 100...

Read MoreRead more about T-Mobile customers, change your PINs

Posts pagination

Previous 1 … 3,926 3,927 3,928 3,929 3,930 3,931 3,932 … 4,246 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-53025

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53024

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53032

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53031

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53023

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel