Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
trukno
  • News

TruKno TTP based Threat Intelligence Platform

December 27, 2020

TruKno’s ThreatBoard is a platform that helps security professionals uncover the root causes behind emerging cyber-attacks, Improving proactive defense postures.....

Read MoreRead more about TruKno TTP based Threat Intelligence Platform
social-analyzer_1_socialanalyzerlogo
  • News

Social-Analyzer – API And Web App For Analyzing And Finding A Person Profile Across +300 Social Media Websites (Detections Are Updated Regularly)

December 27, 2020

An API for analyzing & finding a person profile across +300 social media websites. It includes different string analysis and...

Read MoreRead more about Social-Analyzer – API And Web App For Analyzing And Finding A Person Profile Across +300 Social Media Websites (Detections Are Updated Regularly)
apkleaks_3
  • News

ApkLeaks – Scanning APK File For URIs, Endpoints And Secrets

December 27, 2020

Scanning APK file for URIs, endpoints & secrets.InstallationTo install apkLeaks, simply: $ git clone https://github.com/dwisiswant0/apkleaks$ cd apkleaks/$ pip install -r...

Read MoreRead more about ApkLeaks – Scanning APK File For URIs, Endpoints And Secrets
image-50
  • Tutorials

How to install Tilix on Kali Linux

December 26, 2020

Do you love using Tilix, but found that the latest version of Kali Linux doesn't seem to support installing it...

Read MoreRead more about How to install Tilix on Kali Linux
osint
  • News

The Emotet botnet is back and hits 100K recipients per day

December 26, 2020

Emotet is back on Christmas Eve, cybercrime operators are sending out spam messages to deliver the infamous Trickbot Trojan. Emotet...

Read MoreRead more about The Emotet botnet is back and hits 100K recipients per day
osint
  • News

REvil gang threatens to release intimate pictures of celebs who are customers of The Hospital Group

December 26, 2020

REvil ransomware gang, aka Sodinokibi, hacked The Hospital Group and threatens to release before-and-after pictures of celebrity clients. The Hospital...

Read MoreRead more about REvil gang threatens to release intimate pictures of celebs who are customers of The Hospital Group
osint
  • News

CrowdStrike releases free Azure tool to review assigned privileges

December 26, 2020

CrowdStrike released a free Azure security tool after it was notified by Microsoft of a failed attack leveraging compromised Azure...

Read MoreRead more about CrowdStrike releases free Azure tool to review assigned privileges
osint
  • News

North Korea-linked Lazarus APT targets the COVID-19 research

December 26, 2020

The North Korea-linked Lazarus APT group has recently launched cyberattacks against at least two organizations involved in COVID-19 research. The...

Read MoreRead more about North Korea-linked Lazarus APT targets the COVID-19 research
image-48
  • Hack The Box
  • Premium Members Content
  • Tutorials

Hack The Box Walkthrough Guide To: Academy

December 26, 2020

Disclaimer: I do NOT want you to read this if you have not even tried to attempt any of it...

Read MoreRead more about Hack The Box Walkthrough Guide To: Academy
Internet2Bof2BThings
  • News

URL Spoofing: Interview With Bug Bounty Hunter Narendra Bhati

December 26, 2020

On 24th December, E-Hacking News conducted an interesting interview with Mr. Narendra Bhati, a Bug Bounty Hunter/Ethical Hacker. He was...

Read MoreRead more about URL Spoofing: Interview With Bug Bounty Hunter Narendra Bhati
osint
  • Vulnerabilities

Re: [FD] CVE-2020-8150 – Remote Code Execution as SYSTEM/root via Backblaze

December 26, 2020

Posted by Reed Loden on Dec 25Due to a process fail, this CVE ID was accidentally reused for another vulnerability....

Read MoreRead more about Re: [FD] CVE-2020-8150 – Remote Code Execution as SYSTEM/root via Backblaze
osint
  • Vulnerabilities

Re: [FD] CVE-2020-8152 – Elevation of Privilege in Backblaze

December 26, 2020

Posted by Reed Loden on Dec 25Due to a process fail, this CVE ID was accidentally reused for another vulnerability....

Read MoreRead more about Re: [FD] CVE-2020-8152 – Elevation of Privilege in Backblaze
osint
  • Vulnerabilities

CarolinaCon Online CFP

December 26, 2020

Posted by CarolinaCon on Dec 25We hope this email finds you well. This year has had its challenges and we...

Read MoreRead more about CarolinaCon Online CFP
osint
  • Vulnerabilities

[CVE-2018-7580] – Philips Hue Denial of Service

December 26, 2020

Posted by Ilia Shnaidman on Dec 25 Credits: Ilia Shnaidman @0x496c on Twitter https://www.iliashn.com Vendor: ============= Philips Lighting Holding B.V...

Read MoreRead more about [CVE-2018-7580] – Philips Hue Denial of Service
osint
  • Vulnerabilities

Re: [FD] CVE-2020-8152 – Elevation of Privilege in Backblaze

December 26, 2020

Posted by Jason Geffner on Dec 25Thanks, Reed. I've updated the GitHub repository name to reflect this change. The detailed...

Read MoreRead more about Re: [FD] CVE-2020-8152 – Elevation of Privilege in Backblaze
aura_1_logotype
  • News

Aura – Python Source Code Auditing And Static Analysis On A Large Scale

December 26, 2020

Aura is a static analysis framework developed as a response to the ever-increasing threat of malicious packages and vulnerable code...

Read MoreRead more about Aura – Python Source Code Auditing And Static Analysis On A Large Scale
vulmap
  • News

Vulmap – Web Vulnerability Scanning And Verification Tools

December 26, 2020

Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS...

Read MoreRead more about Vulmap – Web Vulnerability Scanning And Verification Tools
Rapid7-Labs-2020-Naughty-List-Summary-Report-to-Santa
  • News

Rapid7 Labs’ 2020 Naughty List Summary Report to Santa

December 26, 2020

As requested, your dutiful elves here at Rapid7 Labs have compiled a list of the naughty country networks being used...

Read MoreRead more about Rapid7 Labs’ 2020 Naughty List Summary Report to Santa
osint
  • News

The Russian cryptocurrency exchange Livecoin hacked on Christmas Eve

December 25, 2020

Russian cryptocurrency exchange Livecoin was compromised on Christmas Eve, hackers breached its network and gained control of some of its...

Read MoreRead more about The Russian cryptocurrency exchange Livecoin hacked on Christmas Eve
osint
  • News

DDoS amplify attack targets Citrix Application Delivery Controllers (ADC)

December 25, 2020

Citrix confirmed that a DDoS attack is targeting Citrix Application Delivery Controller (ADC) networking equipment. The threat actors are using...

Read MoreRead more about DDoS amplify attack targets Citrix Application Delivery Controllers (ADC)
osint
  • News

Millions of devices could be hacked exploiting flaws targeted by tools stolen from FireEye

December 25, 2020

Millions of devices are potential exposed to attacks targeting the vulnerabilities exploited by the tools stolen from the arsenal of...

Read MoreRead more about Millions of devices could be hacked exploiting flaws targeted by tools stolen from FireEye
osint
  • News

VideoBytes: Offensive security tools and the bad guys that use them

December 25, 2020

Hello Folks!  In this Videobyte, we’re talking about what penetration testing tools malware gangs love to use and why they...

Read MoreRead more about VideoBytes: Offensive security tools and the bad guys that use them
pexels-photo-6266310
  • News

Credential Phishing Attack Impersonating USPS Targets Consumers Over the Holidays

December 25, 2020

 As the year is coming to a wrap, the 2020 holiday season is being actively attacked by malicious actors.  In recent...

Read MoreRead more about Credential Phishing Attack Impersonating USPS Targets Consumers Over the Holidays
osint
  • News

‘Ransomware Task Force’: Microsoft, McAfee and Rapid7 Coalition

December 25, 2020

 19 tech companies, cybersecurity firms, and non-profits have collaborated with the Institute for Security and Technology (IST) to form a...

Read MoreRead more about ‘Ransomware Task Force’: Microsoft, McAfee and Rapid7 Coalition

Posts pagination

Previous 1 … 3,939 3,940 3,941 3,942 3,943 3,944 3,945 … 4,066 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2024-13793

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3419

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-32873

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4127

May 10, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 150[.]158[.]108[.]220:443

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel