Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Securing Critical Infrastructure in the Digital Age

July 18, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Doldrums_1_logo-783659
  • Tools

Doldrums – A Flutter/Dart Reverse Engineering Tool

August 4, 2021

To flutter: to move in quick, irregular motions, to beat rapidly, to be agitated.Doldrums: a period of stagnation. Doldrums is...

Read MoreRead more about Doldrums – A Flutter/Dart Reverse Engineering Tool
rz-ghidra
  • Tools

Rz-Ghidra – Deep Ghidra Decompiler And Sleigh Disassembler Integration For Rizin

August 4, 2021

This is an integration of the Ghidra decompiler and Sleigh Disassembler for rizin. It is solely based on the decompiler...

Read MoreRead more about Rz-Ghidra – Deep Ghidra Decompiler And Sleigh Disassembler Integration For Rizin
osint
  • News

Cisco fixed Remote Code Execution issue in Firepower Device Manager On-Box software

August 3, 2021

Cisco addressed a vulnerability in the Firepower Device Manager (FDM) On-Box software that allows attackers to execute arbitrary code on...

Read MoreRead more about Cisco fixed Remote Code Execution issue in Firepower Device Manager On-Box software
osint
  • News

Experts found potential remote code execution in PyPI

August 3, 2021

A flaw in the GitHub Actions workflow for PyPI ’s source repository could be exploited to potentially execute arbitrary code...

Read MoreRead more about Experts found potential remote code execution in PyPI
osint
  • News

Do You Trust Your Smart TV?

August 3, 2021

Did you ever stop to think that the office smart TV used for company presentations, Zoom meetings, and other work-related...

Read MoreRead more about Do You Trust Your Smart TV?
osint
  • News

PwnedPiper flaws in PTS systems affect 80% of major US hospitals

August 3, 2021

Cybersecurity researchers disclosed multiple flaws, dubbed PwnedPiper, that left a widely-used pneumatic tube system (PTS) vulnerable to attacks. Researchers from...

Read MoreRead more about PwnedPiper flaws in PTS systems affect 80% of major US hospitals
CVE-prog
  • Vulnerabilities

CVE-2021-35516

August 3, 2021

Summary: When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally...

Read MoreRead more about CVE-2021-35516
CVE-prog
  • Vulnerabilities

CVE-2021-35517

August 3, 2021

Summary: When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally...

Read MoreRead more about CVE-2021-35517
CVE-prog
  • Vulnerabilities

CVE-2021-36090

August 3, 2021

Summary: When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally...

Read MoreRead more about CVE-2021-36090
CVE-prog
  • Vulnerabilities

CVE-2020-22283

August 3, 2021

Summary: A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to...

Read MoreRead more about CVE-2020-22283
CVE-prog
  • Vulnerabilities

CVE-2021-1600

August 3, 2021

Summary: Multiple vulnerabilities in Cisco Intersight Virtual Appliance could allow an unauthenticated, adjacent attacker to access sensitive internal services from...

Read MoreRead more about CVE-2021-1600
osint
  • News

A week in security (July 26 – August 1)

August 3, 2021

Last week on Malwarebytes Labs: OSX.XLoader hides little except its main purpose: What we learned in the installation process.The Clubhouse...

Read MoreRead more about A week in security (July 26 – August 1)
jackpotting
  • News

This Vulnerability in E-Learning Platform Moodle Could Even Modify Exam Results

August 3, 2021

 Critical Security Exploit in the popular e learning platform Moodle can be compromised that lets access to student data and...

Read MoreRead more about This Vulnerability in E-Learning Platform Moodle Could Even Modify Exam Results
pexels-tima-miroshnichenko-5380641
  • News

City Officials of Grass Valley Negotiates with the Handlers of Ransomware Attack

August 3, 2021

 The city of Grass Valley is one of the latest victims of a ransomware attack. The operators of the ransomware...

Read MoreRead more about City Officials of Grass Valley Negotiates with the Handlers of Ransomware Attack
code-1839406_1920
  • News

Malevolent PyPI Packages Detected Filching Developer Data

August 3, 2021

 Repositories of software packages have become a frequent target for supply chain attacks. Reports concerning malware attacks on prominent repository...

Read MoreRead more about Malevolent PyPI Packages Detected Filching Developer Data
pexels-photomix-company-218717
  • News

Google Plans to Ban ‘Sugar Dating’ Apps From September

August 3, 2021

 Google is all set to remove ‘Super Dating' applications from the Play Store in order to make the Android app...

Read MoreRead more about Google Plans to Ban ‘Sugar Dating’ Apps From September
hacker-2883632_1920
  • News

Security Researchers Discovered Crimea Manifesto Buried in VBA Rat

August 3, 2021

 On Thursday, Hossein Jazi and the Threat Intelligence team at Malwarebytes released a report revealing a new threat actor that...

Read MoreRead more about Security Researchers Discovered Crimea Manifesto Buried in VBA Rat
domhttpx_7_default-usage-784594
  • Tools

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can Make It Easier For You To Find Many URLs/IPs At Once With Fast Time

August 3, 2021

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to...

Read MoreRead more about Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can Make It Easier For You To Find Many URLs/IPs At Once With Fast Time
PowerShellArmoury_1-793052
  • Tools

PowerShellArmoury – A PowerShell Armoury For Security Guys And Girls

August 3, 2021

The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their...

Read MoreRead more about PowerShellArmoury – A PowerShell Armoury For Security Guys And Girls
osint
  • News

More evidence suggests that DarkSide and BlackMatter are the same group

August 2, 2021

Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. BleepingComputer found evidence that...

Read MoreRead more about More evidence suggests that DarkSide and BlackMatter are the same group
osint
  • News

WordPress Download Manager Plugin was affected by two flaws

August 2, 2021

An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under...

Read MoreRead more about WordPress Download Manager Plugin was affected by two flaws
osint
  • News

Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14

August 2, 2021

The 2021 attacks on two water treatment facilities in the US—combined with ransomware attacks on an oil and gas supplier...

Read MoreRead more about Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14
osint
  • News

Ransomware Attempt Volume Touching Over 300 Million, Sets Record

August 2, 2021

A new investigation report has been published by SonicWall network security organization in which it stated that ransomware attacks have...

Read MoreRead more about Ransomware Attempt Volume Touching Over 300 Million, Sets Record
iphone2B5
  • News

Hacker Uses Credential Phishing to Gain Access Into PayPal Account

August 2, 2021

 Analysts from Cofense Phishing Defense Center recently found a unique PayPal credential phishing attack. Phishing is a harmful technique that...

Read MoreRead more about Hacker Uses Credential Phishing to Gain Access Into PayPal Account

Posts pagination

Previous 1 … 3,948 3,949 3,950 3,951 3,952 3,953 3,954 … 4,254 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hkcert
  • HKCERT
  • News

Ubuntu Linux Kernel Multiple Vulnerabilities

July 18, 2025
hkcert
  • HKCERT
  • News

F5 Products Denial of Service Vulnerability

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7757

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7756

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-23269

July 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel