Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025
unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2021-22445

August 9, 2021

Summary: There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset....

Read MoreRead more about CVE-2021-22445
CVE-prog
  • Vulnerabilities

CVE-2021-34622

August 9, 2021

Summary: A vulnerability in the user profile update component found in the ~/src/Classes/EditUserProfile.php file of the ProfilePress WordPress plugin made...

Read MoreRead more about CVE-2021-34622
Taiwan2Band2BUS
  • News

Taiwanese Computer Hardware Company Gigabyte Suffers Ransomware Attack

August 9, 2021

 Gigabyte, a motherboard developing company from Taiwan and also a hardware giant was attacked by the RansomExx ransomware hacking group,...

Read MoreRead more about Taiwanese Computer Hardware Company Gigabyte Suffers Ransomware Attack
pexels-alesia-kozik-6765369
  • News

Golang Cryptomining Worm Offers 15% Speed Boost

August 9, 2021

 Cybersecurity intelligence at the security firm Intezer has discovered a new Golang-based worm that is attacking Windows and Linux servers...

Read MoreRead more about Golang Cryptomining Worm Offers 15% Speed Boost
pexels-tima-miroshnichenko-5380641-1
  • News

Personal Information of 2,000 FOID Cardholders Compromised in ISP Website Breach

August 9, 2021

 The Illinois State Police are notifying Firearm Owners Identification cardholders regarding a possible data breach after attackers attempted to breach...

Read MoreRead more about Personal Information of 2,000 FOID Cardholders Compromised in ISP Website Breach
anonymous-6512219_1280
  • News

Lithuania has experienced 1,780 cyber incidents in six months

August 9, 2021

According to the Lithuanian military, the sharp increase in the number of hacks is caused by two main reasons –...

Read MoreRead more about Lithuania has experienced 1,780 cyber incidents in six months
pexels-luis-gomes-5468192B252842529
  • News

Cisco: Firewall Manager RCE Flaw is a Zero-day, Patch Arriving Soon

August 9, 2021

 In a Thursday security advisory update, Cisco disclosed that a remote code execution (RCE) vulnerability discovered last month in the...

Read MoreRead more about Cisco: Firewall Manager RCE Flaw is a Zero-day, Patch Arriving Soon
php-jpeg-injector_1-776367
  • Tools

Php-Jpeg-Injector – Injects Php Payloads Into Jpeg Images

August 9, 2021

Injects php payloads into jpeg images. Related to this post. Use CaseYou have a web application that runs a jpeg...

Read MoreRead more about Php-Jpeg-Injector – Injects Php Payloads Into Jpeg Images
image-25
  • Tools

Solitude – A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy Investigations

August 9, 2021

Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or...

Read MoreRead more about Solitude – A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy Investigations
osint
  • News

Security Affairs newsletter Round 326

August 8, 2021

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...

Read MoreRead more about Security Affairs newsletter Round 326
osint
  • News

A zero-day RCE in Cisco ADSM has yet to be fixed

August 8, 2021

A remote code execution (RCE) vulnerability in the Cisco Adaptive Security Device Manager (ADSM) Launcher disclosed in July has yet...

Read MoreRead more about A zero-day RCE in Cisco ADSM has yet to be fixed
osint
  • News

CVE-2021-20090 actively exploited to target millions of IoT devices worldwide

August 8, 2021

Threat actors are actively exploiting a critical authentication bypass issue (CVE-2021-20090) affecting home routers with Arcadyan firmware. Threat actors actively...

Read MoreRead more about CVE-2021-20090 actively exploited to target millions of IoT devices worldwide
CVE-prog
  • Vulnerabilities

CVE-2021-20228

August 8, 2021

Summary: A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is...

Read MoreRead more about CVE-2021-20228
CVE-prog
  • Vulnerabilities

CVE-2020-27153

August 8, 2021

Summary: In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker...

Read MoreRead more about CVE-2020-27153
CVE-prog
  • Vulnerabilities

CVE-2021-21775

August 8, 2021

Summary: A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A...

Read MoreRead more about CVE-2021-21775
CVE-prog
  • Vulnerabilities

CVE-2021-21779

August 8, 2021

Summary: A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web...

Read MoreRead more about CVE-2021-21779
CVE-prog
  • Vulnerabilities

CVE-2021-32791

August 8, 2021

Summary: mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party,...

Read MoreRead more about CVE-2021-32791
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

OrderSnapp – 1,304,447 breached accounts

August 8, 2021

In June 2020, the restaurant solutions provider OrderSnapp suffered a data breach which exposed 1.3M unique email addresses. Impacted data...

Read MoreRead more about OrderSnapp – 1,304,447 breached accounts
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

MMG Fusion – 2,660,295 breached accounts

August 8, 2021

In December 2020, the dental practice management service MMG Fusion was the victim of a data breach which exposed 2.6M...

Read MoreRead more about MMG Fusion – 2,660,295 breached accounts
osint
  • News

Telegram Bug in Mac Allows User To Save Secret Chats

August 8, 2021

 Cybersecurity experts have found a technique for Telegram users of Mac to keep self disappearing texts or view the messages...

Read MoreRead more about Telegram Bug in Mac Allows User To Save Secret Chats
osint
  • News

Detecting Cobalt Strike: Cybercrime Attacks

August 8, 2021

 One of the latest researches revealed that cybercriminals who employ malware often use the Cobalt Strike tool to release multiple...

Read MoreRead more about Detecting Cobalt Strike: Cybercrime Attacks
shahadat-rahman-BfrQnKBulYQ-unsplash-1
  • News

Several Critical Flaws Detected in Las Vegas’s Leading Casinos

August 8, 2021

 External attack surface management platform, Reposify, has discovered multiple vulnerabilities in the IT networks of Las Vegas’s leading casinos. Recently,...

Read MoreRead more about Several Critical Flaws Detected in Las Vegas’s Leading Casinos
pexels-omkar-patyane-211492
  • News

New DNS Flaw Enables ‘Nation-State Level Spying’ on Companies

August 8, 2021

 Researchers discovered a new category of DNS vulnerabilities hitting major DNS-as-a-Service (DNSaaS) providers, which may enable attackers to get access...

Read MoreRead more about New DNS Flaw Enables ‘Nation-State Level Spying’ on Companies
programming-1873854_1920
  • News

Inadequate Payment Leads the Affiliate to Leak the Ransomware Gang’s Technical Manual

August 8, 2021

 A frustrated Conti affiliate revealed the gang's training material during attacks and released details on one of the administrators of...

Read MoreRead more about Inadequate Payment Leads the Affiliate to Leak the Ransomware Gang’s Technical Manual

Posts pagination

Previous 1 … 3,932 3,933 3,934 3,935 3,936 3,937 3,938 … 4,242 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[FLOCKER] – Ransomware Victim: G*********************y[.]org

July 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53101

July 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53019

July 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53819

July 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53821

July 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel