Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract_blue_shield_protection-990x400-1
  • News

How we protect our users against the Sunburst backdoor

December 23, 2020

What happened SolarWinds, a well-known IT managed services provider, has recently become a victim of a cyberattack. Their product Orion...

Read MoreRead more about How we protect our users against the Sunburst backdoor
kenzer_1_kenzer0
  • News

Kenzer – Automated Web Assets Enumeration And Scanning

December 23, 2020

Automated Web Assets Enumeration & Scanning Instructions for running Create an account on Zulip Navigate to Settings > Your Bots...

Read MoreRead more about Kenzer – Automated Web Assets Enumeration And Scanning
osint
  • News

Cellebrite claims to be able to access Signal messages

December 23, 2020

Israeli cyber security firm Cellebrite claims that it can decrypt messages from the popular Signal’s messaging app. Israeli security firm...

Read MoreRead more about Cellebrite claims to be able to access Signal messages
osint
  • News

Research: nearly all of your messaging apps are secure

December 23, 2020

CyberNews Investigation team analyzed the 13 most popular messaging apps to see if the apps are really safe.  Source: https://cybernews.com/security/research-nearly-all-of-your-messaging-apps-are-secure/...

Read MoreRead more about Research: nearly all of your messaging apps are secure
osint
  • News

Researchers shared the lists of victims of SolarWinds hack

December 23, 2020

Security experts shared lists of organizations that were infected with the SolarWinds Sunburst backdoor after decoding the DGA mechanism. Security...

Read MoreRead more about Researchers shared the lists of victims of SolarWinds hack
emo21
  • News

Emotet returns just in time for Christmas

December 23, 2020

Emotet is a threat we have been tracking very closely throughout the year thanks to its large email distribution campaigns....

Read MoreRead more about Emotet returns just in time for Christmas
osint
  • News

Beware: not so festive social media scams

December 23, 2020

We’re now into the most crucial stage of Christmas festivities, where money and gifts are on the march…and social media...

Read MoreRead more about Beware: not so festive social media scams
laptop-593673_1280
  • News

Experts listed the possible goals of cyber criminals who hack websites

December 23, 2020

According to Positive Technologies, in 2020, cybercriminals have become increasingly interested in hacking sites: in seven out of ten cases,...

Read MoreRead more about Experts listed the possible goals of cyber criminals who hack websites
pexels-photo-5226513
  • News

New marketing campaign against UK subway by using TrickBot malware

December 23, 2020

  UK subway market has disclosed that its marketing system has been hacked. The malicious actor was sending TrickBot malware-laden...

Read MoreRead more about New marketing campaign against UK subway by using TrickBot malware
hacker-1952027_1280
  • News

The Ministry of Internal Affairs of Russia is creating a cyber police

December 23, 2020

 Deputy Interior Minister Igor Zubov noted that the number of cybercrimes has increased significantly in the context of the coronavirus...

Read MoreRead more about The Ministry of Internal Affairs of Russia is creating a cyber police
pexels-duophenom-2417848
  • News

iPhones of Al Jazeera Journalists Being Snooped On Via Israeli Firm’s Spyware

December 23, 2020

 iPhones of around 36 Journalists at Al Jazeera news organisation have been hacked by nation-sponsored hackers who sent malware laden...

Read MoreRead more about iPhones of Al Jazeera Journalists Being Snooped On Via Israeli Firm’s Spyware
Grawler_1_grawler1
  • News

Grawler – Tool Which Comes With A Web Interface That Automates The Task Of Using Google Dorks, Scrapes The Results, And Stores Them In A File

December 23, 2020

Grawler is a tool written in PHP which comes with a web interface that automates the task of using google...

Read MoreRead more about Grawler – Tool Which Comes With A Web Interface That Automates The Task Of Using Google Dorks, Scrapes The Results, And Stores Them In A File
0d1n_1_overview1
  • News

0D1N v3.4 – Tool For Automating Customized Attacks Against Web Applications (Full Made In C Language With Pthreads, Have A Fast Performance)

December 23, 2020

0d1n is a tool for automating customized attacks against web applications. This tool is very faster because uses thread pool...

Read MoreRead more about 0D1N v3.4 – Tool For Automating Customized Attacks Against Web Applications (Full Made In C Language With Pthreads, Have A Fast Performance)
osint
  • Vulnerabilities

AST-2020-004: Remote crash in res_pjsip_diversion

December 23, 2020

Posted by Asterisk Security Team on Dec 22 Asterisk Project Security Advisory - AST-2020-004 Product Asterisk Summary Remote crash in...

Read MoreRead more about AST-2020-004: Remote crash in res_pjsip_diversion
osint
  • Vulnerabilities

AST-2020-003: Remote crash in res_pjsip_diversion

December 23, 2020

Posted by Asterisk Security Team on Dec 22 Asterisk Project Security Advisory - AST-2020-003 Product Asterisk Summary Remote crash in...

Read MoreRead more about AST-2020-003: Remote crash in res_pjsip_diversion
UPnP-With-a-Holiday-Cheer2
  • News

UPnP With a Holiday Cheer

December 23, 2020

T'was the night before HaXmas,when all through the house,Not a creature was stirring, not even a mouse.The stockings were hung...

Read MoreRead more about UPnP With a Holiday Cheer
Set-New-InsightVM-Goals-and-Share-with-Your-Team-for-Increased-Visibility-and-More-Efficient-Execution2
  • News

Set New InsightVM Goals and Share with Your Team for Increased Visibility and More Efficient Execution

December 23, 2020

Since 2018, thousands of enterprises have utilized InsightVM’s Goals and SLAs feature to build their organization-specific security goals. Through Goals...

Read MoreRead more about Set New InsightVM Goals and Share with Your Team for Increased Visibility and More Efficient Execution
osint
  • News

Bulletproof VPN services took down in a global police operation

December 22, 2020

A joint operation conducted by law European enforcement agencies resulted in the seizure of the infrastructure of three bulletproof VPN...

Read MoreRead more about Bulletproof VPN services took down in a global police operation
osint
  • News

VMware and Cisco also impacted by the SolarWinds hack

December 22, 2020

The IT giants VMware and Cisco revealed they were impacted by the recently disclosed SolarWinds supply chain attack. VMware and...

Read MoreRead more about VMware and Cisco also impacted by the SolarWinds hack
osint
  • News

Dell Wyse ThinOS flaws allow hacking think clients

December 22, 2020

Multiple Dell Wyse thin client models are affected by critical vulnerabilities that could be exploited by a remote attacker to...

Read MoreRead more about Dell Wyse ThinOS flaws allow hacking think clients
osint
  • News

SUPERNOVA, a backdoor found while investigating SolarWinds hack

December 22, 2020

While investigating the recent SolarWinds Orion supply-chain attack security researchers discovered another backdoor, tracked SUPERNOVA. The investigation of the SolarWinds...

Read MoreRead more about SUPERNOVA, a backdoor found while investigating SolarWinds hack
osint
  • News

A week in security (December 14 – December 20)

December 22, 2020

Last week on Malwarebytes Labs we kept you updated on the SolarWinds attack, we warned about the special dangers that...

Read MoreRead more about A week in security (December 14 – December 20)
Threatboard2BDashboard2Bv12B2528Saumya2529
  • News

Trukno: “On A Mission To Deliver Cyber Intelligence, Not Cyber News”

December 22, 2020

 Trukno: Virtual Threat Intelligence Analyst to launch their Broad Beta Version on 22nd. Every second a new attack in cybersecurity...

Read MoreRead more about Trukno: “On A Mission To Deliver Cyber Intelligence, Not Cyber News”
jackpotting-1
  • News

US Cyberattack: More than 50 Companies Suffer A Massive Breach

December 22, 2020

FireEye, the cybersecurity firm responsible for finding out about the massive hacking campaign against the US government says that 50...

Read MoreRead more about US Cyberattack: More than 50 Companies Suffer A Massive Breach

Posts pagination

Previous 1 … 3,941 3,942 3,943 3,944 3,945 3,946 3,947 … 4,067 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-4487

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4488

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4490

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4486

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4491

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel