Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025
unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
schedule-522x600-1
  • News

Steamship Authority answers question: Who’s the next ransomware victim?

June 4, 2021

After the attacks on Colonial Pipeline and JBS, many may have been wondering, as we did, what the next ransomware...

Read MoreRead more about Steamship Authority answers question: Who’s the next ransomware victim?
osint
  • News

Coronavirus phishing: “Welcome back to the office…”

June 4, 2021

As offices start to slowly open back up, the theoretically post-pandemic world is changing its threat landscape once again, and...

Read MoreRead more about Coronavirus phishing: “Welcome back to the office…”
pexels-tima-miroshnichenko-5380664
  • News

Cybercrime Forum Publishes Alleged Database, Source Code From Russian Firm That Helped Parler

June 4, 2021

 A seller on a famous cybercrime website claims to be selling source code and a database that they claim belongs...

Read MoreRead more about Cybercrime Forum Publishes Alleged Database, Source Code From Russian Firm That Helped Parler
myanmar-2697293_1920
  • News

Myanmar President’s Office Hacked for the Second Time

June 4, 2021

 A cyber-espionage hacking gang is suspected of breaking into the Myanmar president's office website and injecting a backdoor trojan into...

Read MoreRead more about Myanmar President’s Office Hacked for the Second Time
smartphone-1284501_1280
  • News

The first users got SIM cards with Russian encryption

June 4, 2021

Voentelecom has started implementing SIM cards that should create a "trusted environment" on smartphones. The transition to such SIM cards...

Read MoreRead more about The first users got SIM cards with Russian encryption
question-mark-5868011_1280
  • News

Every tenth significant IT system in Russia is infected with malware

June 4, 2021

 According to Rostelecom-Solar research, every 10th critical information infrastructure (CII) in the Russian Federation is compromised by malware. Even hackers...

Read MoreRead more about Every tenth significant IT system in Russia is infected with malware
spdiey2Bbot
  • News

Industrial Switches Given by the Vendors Affected by a Same Vulnerability

June 4, 2021

Industrial switches that were given by the vendors have been affected by a same vulnerability, the reason being they all...

Read MoreRead more about Industrial Switches Given by the Vendors Affected by a Same Vulnerability
abstract-e-mail-SL-e1622643637295-990x400-1
  • News

Email spoofing: how attackers impersonate legitimate senders

June 4, 2021

Introduction In a nutshell, email spoofing is the creation of fake emails that seem legitimate. This article analyzes the spoofing...

Read MoreRead more about Email spoofing: how attackers impersonate legitimate senders
bn-uefi-helper_2_screen-762734
  • Tools

Bn-Uefi-Helper – Helper Plugin For Analyzing UEFI Firmware

June 4, 2021

Helper plugin for analyzing UEFI firmware. This plugin contains the following features: Apply the correct prototype to the entry point...

Read MoreRead more about Bn-Uefi-Helper – Helper Plugin For Analyzing UEFI Firmware
403fuzzer_1-709152
  • Tools

403Fuzzer – Fuzz 403/401Ing Endpoints For Bypasses

June 4, 2021

Fuzz 403ing endpoints for bypasses Follow on twitter! @intrudirThis tool will check the endpoint with a couple of headers such...

Read MoreRead more about 403Fuzzer – Fuzz 403/401Ing Endpoints For Bypasses
osint
  • News

Flaws in Realtek RTL8170C Wi-Fi module allow hijacking wireless communications

June 3, 2021

Researchers found multiple flaws in the Realtek RTL8170C Wi-Fi module that could be exploited to elevate privileges and hijack wireless...

Read MoreRead more about Flaws in Realtek RTL8170C Wi-Fi module allow hijacking wireless communications
osint
  • News

FBI confirmed that JBS was hit by the REvil ransomware gang

June 3, 2021

The US FBI announced that REvil ransomware gang (also known as Sodinokibi) is behind the attack that hit JBS Foods....

Read MoreRead more about FBI confirmed that JBS was hit by the REvil ransomware gang
osint
  • News

AMT Games data breach: Millions of Users’ Messages, Account IDs, and IP Addresses Exposed

June 3, 2021

WizCase’s security team discovered an unsecured ElasticSearch server owned by AMT Games which exposed 1.47 TB of data. This leak exposed...

Read MoreRead more about AMT Games data breach: Millions of Users’ Messages, Account IDs, and IP Addresses Exposed
osint
  • News

Cyber Defense Magazine – June 2021 has arrived. Enjoy it!

June 3, 2021

Cyber Defense Magazine June 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 129 pages of...

Read MoreRead more about Cyber Defense Magazine – June 2021 has arrived. Enjoy it!
osint
  • News

Critical 0day in the Fancy Product Designer WordPress plugin actively exploited

June 3, 2021

A critical zero-day vulnerability in the Fancy Product Designer WordPress plugin exposes more than 17,000 websites to attacks. Researchers from...

Read MoreRead more about Critical 0day in the Fancy Product Designer WordPress plugin actively exploited
CVE-prog
  • Vulnerabilities

CVE-2021-21206

June 3, 2021

Summary: Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap...

Read MoreRead more about CVE-2021-21206
CVE-prog
  • Vulnerabilities

CVE-2021-21207

June 3, 2021

Summary: Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to...

Read MoreRead more about CVE-2021-21207
CVE-prog
  • Vulnerabilities

CVE-2020-36197

June 3, 2021

Summary: An improper access control vulnerability has been reported to affect earlier versions of Music Station. If exploited, this vulnerability...

Read MoreRead more about CVE-2020-36197
CVE-prog
  • Vulnerabilities

CVE-2020-27815

June 3, 2021

Summary: A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with...

Read MoreRead more about CVE-2020-27815
CVE-prog
  • Vulnerabilities

CVE-2021-33563

June 3, 2021

Summary: Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had...

Read MoreRead more about CVE-2021-33563
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Dominos India – 22,527,655 breached accounts

June 3, 2021

In April 2021, 13TB of compromised Dominos India appeared for sale on a hacking forum after which the company acknowledged...

Read MoreRead more about Dominos India – 22,527,655 breached accounts
Tweets-508x600-1
  • News

JBS says it is recovering quickly from a ransomware attack

June 3, 2021

This week another major supplier reported it had been hit with ransomware. After the Colonial Pipeline attack last month, this...

Read MoreRead more about JBS says it is recovering quickly from a ransomware attack
pexels-tima-miroshnichenko-5380584
  • News

Poisoned Installers Found in SolarWinds Hackers Toolkit

June 3, 2021

 The ongoing multi-vendor investigations into the SolarWinds mega-hack took a new turn this week when additional malware artifacts were discovered...

Read MoreRead more about Poisoned Installers Found in SolarWinds Hackers Toolkit
pexels-dom-j-45111
  • News

New Zealand Reserve Bank: Taking Action to Respond to Data Breach Reports

June 3, 2021

 Two independent investigations into an unauthorized data breach and the handling of sensitive information have been announced by the Reserve...

Read MoreRead more about New Zealand Reserve Bank: Taking Action to Respond to Data Breach Reports

Posts pagination

Previous 1 … 3,945 3,946 3,947 3,948 3,949 3,950 3,951 … 4,207 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: DKN Hotels

July 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Corinthian Media

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-49595

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-43713

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3702

July 4, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel