Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025
unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
hacking-4839031_1280
  • News

The Secretary of the Russian Security Council spoke about the new information security strategy

June 3, 2021

The Secretary of the Security Council also reported on cyber security threats in the draft of the new National Security...

Read MoreRead more about The Secretary of the Russian Security Council spoke about the new information security strategy
shahadat-rahman-BfrQnKBulYQ-unsplash-1
  • News

Security Experts Unearthed the Flaws in EPUB Similar to Web Browsers

June 3, 2021

 Security researchers at imec-DistriNet Research Group have discovered the vulnerabilities in e-book reading systems that allow hackers to exploit the...

Read MoreRead more about Security Experts Unearthed the Flaws in EPUB Similar to Web Browsers
jackpotting
  • News

Russian Hacking Group Nobelium Attacks 150 Organizations, Hacks Mails

June 3, 2021

Nobelium, a Russian hacking group that was responsible for the 2020 SolarWinds cyberattacks, is back in the game, however, now,...

Read MoreRead more about Russian Hacking Group Nobelium Attacks 150 Organizations, Hacks Mails
onelinepy_1_oneline-710961
  • Tools

Onelinepy – Python Obfuscator To Generate One-Liners And FUD Payloads

June 3, 2021

 Python Obfuscator To Generate One-Liners And FUD Payloads.Download & Rungit clone https://github.com/spicesouls/onelinepycd onelinepychmod +x setup.sh./setup.shonelinepy Usage Guide _ _ ___...

Read MoreRead more about Onelinepy – Python Obfuscator To Generate One-Liners And FUD Payloads
Arkhota_1_banner-721104
  • Tools

Arkhota – A Web Brute Forcer For Android

June 3, 2021

What?Arkhota is a web (HTTP/S) brute forcer for Android. Why?A web brute forcer is always in a hacker's computer, for...

Read MoreRead more about Arkhota – A Web Brute Forcer For Android
osint
  • News

$280 million stolen per month from crypto transactions

June 2, 2021

CyberNews researchers found that front-runners are abusing decentralized cryptocurrency exchanges by draining hundreds of millions in crypto from trader transactions...

Read MoreRead more about $280 million stolen per month from crypto transactions
osint
  • News

Database, source code allegedly related to bulletproof hosting, once Parler’s service provider, up for sale on hacker forum

June 2, 2021

Group-IB discovered a database allegedly belonging to a bulletproof hosting provider DDoS-Guard posted for sale on a cybercrime forum. Group-IB,...

Read MoreRead more about Database, source code allegedly related to bulletproof hosting, once Parler’s service provider, up for sale on hacker forum
osint
  • News

Exploit broker Zerodium is looking for Pidgin 0day exploits

June 2, 2021

Zero-day exploit broker Zerodium is looking for 0day exploits affecting the IM client tool Pidgin on Windows and Linux. Zero-day...

Read MoreRead more about Exploit broker Zerodium is looking for Pidgin 0day exploits
osint
  • News

US seizes 2 domains used by APT29 in a recent phishing campaign

June 2, 2021

The US DoJ seized two domains used by APT29 group in recent attacks impersonating the U.S. USAID to spread malware....

Read MoreRead more about US seizes 2 domains used by APT29 in a recent phishing campaign
osint
  • News

JBS attack has likely a Russian origin

June 2, 2021

White House spokeswoman speculates threat actors behind the JBS ransomware attack have a Russian origin. The American food processing giant...

Read MoreRead more about JBS attack has likely a Russian origin
osint
  • News

New Epsilon Red Ransomware appears in the threat landscape

June 2, 2021

Researchers spotted a new piece of ransomware named Epsilon Red that was employed at least in an attack against a...

Read MoreRead more about New Epsilon Red Ransomware appears in the threat landscape
CVE-prog
  • Vulnerabilities

CVE-2021-27028

June 2, 2021

Summary: A Memory Corruption Vulnerability in Autodesk FBX Review version 1.4.0 may lead to remote code execution through maliciously crafted...

Read MoreRead more about CVE-2021-27028
CVE-prog
  • Vulnerabilities

CVE-2019-15538

June 2, 2021

Summary: An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a...

Read MoreRead more about CVE-2019-15538
CVE-prog
  • Vulnerabilities

CVE-2019-14821

June 2, 2021

Summary: An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's...

Read MoreRead more about CVE-2019-14821
CVE-prog
  • Vulnerabilities

CVE-2021-27027

June 2, 2021

Summary: A Out-Of-Bounds Read/Write Vulnerability in Autodesk FBX Review version 1.4.0 may lead to remote code execution through maliciously crafted...

Read MoreRead more about CVE-2021-27027
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

JD – 77,449,341 breached accounts

June 2, 2021

In 2013 (exact date unknown), the Chinese e-commerce service JD suffered a data breach that exposed 13GB of data containing...

Read MoreRead more about JD – 77,449,341 breached accounts
osint
  • News

WhatsApp reverses course, will not limit app functionality

June 2, 2021

WhatsApp, the end-to-end encrypted messaging service that has lost users, its founders, and a large amount of public goodwill, issued...

Read MoreRead more about WhatsApp reverses course, will not limit app functionality
osint
  • News

Cobalt Strike, a penetration testing tool abused by criminals

June 2, 2021

If you were to compose a list of tools and software developed by security and privacy defenders that ended up...

Read MoreRead more about Cobalt Strike, a penetration testing tool abused by criminals
phish
  • News

Kimsuky APT continues to target South Korean government using AppleSeed backdoor

June 2, 2021

This blog post was authored by Hossein Jazi. The Kimsuky APT—also known as Thallium, Black Banshee, and Velvet Chollima—is a...

Read MoreRead more about Kimsuky APT continues to target South Korean government using AppleSeed backdoor
fraud-prevention-3188092_1920
  • News

Russian Man Convicted of $7 Million Digital Advertising Scam

June 2, 2021

 A Russian person was found guilty in the United States of using a bot farm and hiring servers to create...

Read MoreRead more about Russian Man Convicted of $7 Million Digital Advertising Scam
Internet2Bof2BThings
  • News

Deadshot: A Tool That Marks Sensitive Content for Developers

June 2, 2021

Software code repositories might be hiding credentials, sensitive data, and other secrets of an organization without the knowledge of developers....

Read MoreRead more about Deadshot: A Tool That Marks Sensitive Content for Developers
sai-kiran-anagani-5Ntkpxqt54Y-unsplash
  • News

Interpol Seize $83 Million in Operation Against Online Financial Fraud

June 2, 2021

 More than 500 suspects were arrested in the Interpol-coordinated Operation ‘HAECHI-I’ and $83 million were seized which belonged to the...

Read MoreRead more about Interpol Seize $83 Million in Operation Against Online Financial Fraud
pexels-fernando-arcos-211151
  • News

What is a Supply Chain Attack? Here’s How is it Making Your Software Vulnerable

June 2, 2021

 Users receive warnings from public and private organizations asking them to be aware of fraud links and sources, to not...

Read MoreRead more about What is a Supply Chain Attack? Here’s How is it Making Your Software Vulnerable
pexels-anna-tarazevich-5697256
  • News

Pay Attention: These Unsubscribe Emails Only Lead to Further Spam

June 2, 2021

 Scammers send out fake 'unsubscribe' spam emails to validate legitimate email addresses for future phishing and spam campaigns. Spammers have been...

Read MoreRead more about Pay Attention: These Unsubscribe Emails Only Lead to Further Spam

Posts pagination

Previous 1 … 3,946 3,947 3,948 3,949 3,950 3,951 3,952 … 4,207 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: DKN Hotels

July 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Corinthian Media

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-49595

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-43713

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3702

July 4, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel