Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14

August 2, 2021

The 2021 attacks on two water treatment facilities in the US—combined with ransomware attacks on an oil and gas supplier...

Read MoreRead more about Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14
osint
  • News

Ransomware Attempt Volume Touching Over 300 Million, Sets Record

August 2, 2021

A new investigation report has been published by SonicWall network security organization in which it stated that ransomware attacks have...

Read MoreRead more about Ransomware Attempt Volume Touching Over 300 Million, Sets Record
iphone2B5
  • News

Hacker Uses Credential Phishing to Gain Access Into PayPal Account

August 2, 2021

 Analysts from Cofense Phishing Defense Center recently found a unique PayPal credential phishing attack. Phishing is a harmful technique that...

Read MoreRead more about Hacker Uses Credential Phishing to Gain Access Into PayPal Account
adi-goldstein-EUsVwEOsblE-unsplash
  • News

Exploit Code Released for a Critical Flaw in Linux Kernel eBPF on Ubuntu Machines

August 2, 2021

 Cybersecurity researcher Manfred Paul revealed the details of the code for abusing a critical flaw in the Linux eBPF (Extended...

Read MoreRead more about Exploit Code Released for a Critical Flaw in Linux Kernel eBPF on Ubuntu Machines
malicious-code-4036349_1920
  • News

Russia’s APT29 is Actively Serving WellMess/WellMail Malware

August 2, 2021

 A year ago, the United Kingdom, the USA, and Canada released a coordinated advisory, during the global pandemic, revealing a...

Read MoreRead more about Russia’s APT29 is Actively Serving WellMess/WellMail Malware
pexels-sora-shimazaki-59357942B252822529
  • News

Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings

August 2, 2021

 President Joe Biden's appeal for Vladimir Putin to crack down on cyberattacks emanating from within Russia appears to have failed...

Read MoreRead more about Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings
tsharkVM_1_tshark_vm_dashboard-726339
  • Tools

tsharkVM – Tshark + ELK Analytics Virtual Machine

August 2, 2021

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance...

Read MoreRead more about tsharkVM – Tshark + ELK Analytics Virtual Machine
Disk2BForensics
  • Tools

CSIRT-Collect – PowerShell Script To Collect Memory And (Triage) Disk Forensics

August 2, 2021

A PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a network share,...

Read MoreRead more about CSIRT-Collect – PowerShell Script To Collect Memory And (Triage) Disk Forensics
osint
  • News

GhostEmperor, a new Chinese-speaking threat actor targets Southeast Asia

August 1, 2021

Kaspersky experts spotted a previously undocumented Chinese-speaking threat actor, tracked as GhostEmperor, that is targeting Microsoft Exchange flaws in attacks...

Read MoreRead more about GhostEmperor, a new Chinese-speaking threat actor targets Southeast Asia
osint
  • News

Security Affairs newsletter Round 325

August 1, 2021

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...

Read MoreRead more about Security Affairs newsletter Round 325
osint
  • News

Threat actors leaked data stolen from EA, including FIFA code

August 1, 2021

Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure...

Read MoreRead more about Threat actors leaked data stolen from EA, including FIFA code
osint
  • News

SolarWinds hackers breached 27 state attorneys’ offices

August 1, 2021

Microsoft Office 365 email accounts of employees at 27 US Attorneys’ offices were breached by the Russia-linked SVR group as part of...

Read MoreRead more about SolarWinds hackers breached 27 state attorneys’ offices
CVE-prog
  • Vulnerabilities

CVE-2018-20346

August 1, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20346
CVE-prog
  • Vulnerabilities

CVE-2018-20346

August 1, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20346
CVE-prog
  • Vulnerabilities

CVE-2018-20346

August 1, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20346
CVE-prog
  • Vulnerabilities

CVE-2018-20506

August 1, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20506
CVE-prog
  • Vulnerabilities

CVE-2019-1543

August 1, 2021

Summary: ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that...

Read MoreRead more about CVE-2019-1543
CVE-prog
  • Vulnerabilities

CVE-2021-3246

August 1, 2021

Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...

Read MoreRead more about CVE-2021-3246
CVE-prog
  • Vulnerabilities

CVE-2021-32761

August 1, 2021

Summary: Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer...

Read MoreRead more about CVE-2021-32761
sai-kiran-anagani-5Ntkpxqt54Y-unsplash
  • News

Seven-Fold Surge in Dark Web Ads Providing Corporate Network Access

August 1, 2021

 In the latest study, researchers at Positive Technologies have documented the evolution of hacker-placed ads on the Dark Web from...

Read MoreRead more about Seven-Fold Surge in Dark Web Ads Providing Corporate Network Access
deep-web-1292336_1280
  • News

Bot that helps hackers write code

August 1, 2021

 The Copilot service developed by Microsoft and GitHub specialists, designed to simplify the work of programmers, can be used by...

Read MoreRead more about Bot that helps hackers write code
pexels-leslie-toh-880929
  • News

Wiper Malware Used in Attack Against Iranian Railway

August 1, 2021

 The cyber-attack that crippled Iran's national railway system at the beginning of the month was caused by a disk-wiping malware...

Read MoreRead more about Wiper Malware Used in Attack Against Iranian Railway
cards-3252979_1280
  • News

Two Belarusian Arrested in Black Box ATM Attack

August 1, 2021

 The Polish authorities have detained two individuals committing so-called ‘Black Box’ attacks, targeting ATMs, whereby criminal offenders attach electronic devices...

Read MoreRead more about Two Belarusian Arrested in Black Box ATM Attack
cyber-3327240_1920
  • News

Following a Ransomware Cyberattack, D-BOX Stated it is Gradually Restarting Operations

August 1, 2021

 After a ransomware cyberattack on its internal information-technology systems, D-BOX Technologies Inc. says it is progressively resuming operations, with restoration...

Read MoreRead more about Following a Ransomware Cyberattack, D-BOX Stated it is Gradually Restarting Operations

Posts pagination

Previous 1 … 3,945 3,946 3,947 3,948 3,949 3,950 3,951 … 4,250 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: lawforpersonalinjury[.]com

July 17, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Media Broadcast Satellite

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-20274

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-20284

July 17, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-20285

July 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel