Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025
unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2021-36213

July 29, 2021

Summary: HashiCorp Consul and Consul Enterprise 1.9.0 through 1.10.0 default deny policy with a single L7 application-aware intention deny action...

Read MoreRead more about CVE-2021-36213
CVE-prog
  • Vulnerabilities

CVE-2020-36423

July 29, 2021

Summary: An issue was discovered in Arm Mbed TLS before 2.23.0. A remote attacker can recover plaintext because a certain...

Read MoreRead more about CVE-2020-36423
CVE-prog
  • Vulnerabilities

CVE-2020-36426

July 29, 2021

Summary: An issue was discovered in Arm Mbed TLS before 2.24.0. mbedtls_x509_crl_parse_der has a buffer over-read (of one byte). Reference...

Read MoreRead more about CVE-2020-36426
CVE-prog
  • Vulnerabilities

CVE-2021-34675

July 29, 2021

Summary: Basix NEX-Forms through 7.8.7 allows authentication bypass for stored PDF reports. Reference Links(if available): https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34675 http://basixonline.net/nex-forms-wordpress-form-builder-demo/change-log/ CVSS Score (if...

Read MoreRead more about CVE-2021-34675
CVE-prog
  • Vulnerabilities

CVE-2021-34676

July 29, 2021

Summary: Basix NEX-Forms through 7.8.7 allows authentication bypass for Excel report generation. Reference Links(if available): https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34676 http://basixonline.net/nex-forms-wordpress-form-builder-demo/change-log/ CVSS Score (if...

Read MoreRead more about CVE-2021-34676
image-15
  • Premium Members Content
  • Tutorials

Step by step guide on Setting up NordLynx Wireguard VPN in PfSense

July 29, 2021

IF you already use NordVPN, you will be well aware that they refuse to give out the WireGuard config information...

Read MoreRead more about Step by step guide on Setting up NordLynx Wireguard VPN in PfSense
recordedfuture-blackmatter-ad-exploit-forum-600x518-1
  • News

BlackMatter, a new ransomware group, claims link to DarkSide, REvil

July 29, 2021

There’s a new ransomware gang in town—and, frankly, we’re not at all surprised. After DarkSide disappeared—coincidentally, immediately after Colonial Pipeline...

Read MoreRead more about BlackMatter, a new ransomware group, claims link to DarkSide, REvil
osint
  • News

The Olympics: a timeline of scams, hacks, and malware

July 29, 2021

The 2020 Olympics are, after a bit of a delayed start, officially in full swing. So too is the possibility...

Read MoreRead more about The Olympics: a timeline of scams, hacks, and malware
osint
  • News

UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root

July 29, 2021

Researchers at RandoriSec have found serious vulnerabilities in the firmware provided by UDP Technology to Geutebrück and many other IP...

Read MoreRead more about UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root
sai-kiran-anagani-5Ntkpxqt54Y-unsplash-4
  • News

Signal Patches Zero-Day Bug in its Android App

July 29, 2021

 Signal has patched a critical flaw in its Android app that, in some circumstances, sent random unintended images to contacts...

Read MoreRead more about Signal Patches Zero-Day Bug in its Android App
pexels-anthony-133325
  • News

Cyberattacks Zero in Tokyo Olympics as Games Begin

July 29, 2021

 Malicious malware and websites have targeted both event organizers and regular spectators as the Tokyo Olympics' opening ceremony approaches. According to...

Read MoreRead more about Cyberattacks Zero in Tokyo Olympics as Games Begin
goran-ivos-iacpoKgpBAM-unsplash
  • News

Hackers Applying HTML Smuggling To Distribute Malware

July 29, 2021

 Another latest spam E-mail operation, which abused a technique named "HTML smuggling" to circumvent E-mail security measures and transmit malware...

Read MoreRead more about Hackers Applying HTML Smuggling To Distribute Malware
windows-11-6379123_1920
  • News

Fake Windows 11 Installers are Being Used to Spread Malware

July 29, 2021

 Although Windows 11 isn't expected to be released until later this year, hackers have already begun attempting to use it...

Read MoreRead more about Fake Windows 11 Installers are Being Used to Spread Malware
abstract-light-sl-scaled-1-990x400-1
  • News

DDoS attacks in Q2 2021

July 29, 2021

News overview In terms of big news, Q2 2021 was relatively calm, but not completely eventless. For example, April saw the...

Read MoreRead more about DDoS attacks in Q2 2021
CredPhish_1_credphish-752010
  • Tools

CredPhish – A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS

July 29, 2021

CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user...

Read MoreRead more about CredPhish – A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS
LoGiC.NET_2_after-702574
  • Tools

LoGiC.NET – A More Advanced Free And Open .NET Obfuscator Using Dnlib

July 29, 2021

LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works...

Read MoreRead more about LoGiC.NET – A More Advanced Free And Open .NET Obfuscator Using Dnlib
osint
  • News

IBM Cost of a Data Breach study: average Cost of Data Breach exceeds $4.2M

July 28, 2021

The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded...

Read MoreRead more about IBM Cost of a Data Breach study: average Cost of Data Breach exceeds $4.2M
osint
  • News

BlackMatter ransomware group claims to be Darkside and REvil succesor

July 28, 2021

BlackMatter ransomware gang, a new threat actor appears in the threat landscape and claims to combine TTPs of Darkside and...

Read MoreRead more about BlackMatter ransomware group claims to be Darkside and REvil succesor
osint
  • News

Flaws in Zimbra could allow to takeover webmail server of a targeted organization

July 28, 2021

Researchers discovered flaws in Zimbra email collaboration software that could allow attackers to compromise email accounts by sending a malicious...

Read MoreRead more about Flaws in Zimbra could allow to takeover webmail server of a targeted organization
osint
  • News

Kaseya Unitrends has unpatched vulnerabilities that could help attackers expand a breach

July 28, 2021

It must not be easy to work at Kaseya right now. While they are working as hard as they can...

Read MoreRead more about Kaseya Unitrends has unpatched vulnerabilities that could help attackers expand a breach
osint
  • News

The Clubhouse database “breach” is likely a non-breach. Here’s why.

July 28, 2021

Before the work week ended last week Friday, a security researcher found a leak of what is claimed to be...

Read MoreRead more about The Clubhouse database “breach” is likely a non-breach. Here’s why.
pexels-tima-miroshnichenko-5380641-4
  • News

Mobile County Officials Informs County Employees of Data Breach

July 28, 2021

 The officials of Mobile County in southwest Alabama, have finally notified county employees of a computer system breach that compromised...

Read MoreRead more about Mobile County Officials Informs County Employees of Data Breach
fly-d-zAhAUSdRLJ8-unsplash
  • News

Q2 2021 Report by Digital Shadow, Abridged

July 28, 2021

 Q2 2021 was among the most important ransomware periods, with several significant events taking place. Humans witnessed one of the...

Read MoreRead more about Q2 2021 Report by Digital Shadow, Abridged
pexels-anton-469242B252812529
  • News

WhatsApp CEO: US Allies’ National Security Officials Targeted with NSO Malware

July 28, 2021

 According to WhatsApp CEO Will Cathcart, governments used NSO group malware to target high-ranking government officials all around the world. Cathcart...

Read MoreRead more about WhatsApp CEO: US Allies’ National Security Officials Targeted with NSO Malware

Posts pagination

Previous 1 … 3,937 3,938 3,939 3,940 3,941 3,942 3,943 … 4,239 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-7540

July 14, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7536

July 14, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53865

July 14, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7538

July 14, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7537

July 14, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel