Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Over 80 US Municipalities’ Sensitive Information, Including Resident’s Personal Data, Left Vulnerable in Massive Data Breach

July 24, 2021

WizCase’s team of ethical hackers, led by Ata Hakçıl, has found a major breach exposing a number of US cities, all...

Read MoreRead more about Over 80 US Municipalities’ Sensitive Information, Including Resident’s Personal Data, Left Vulnerable in Massive Data Breach
osint
  • News

What Is An Identity and Access Management So-lution and How Can Businesses Benefit From It?

July 24, 2021

How businesses can benefit from the adoption of an identity and access management solution. Businesses that use outdated manual processes...

Read MoreRead more about What Is An Identity and Access Management So-lution and How Can Businesses Benefit From It?
osint
  • News

Kaseya obtained a universal decryptor for REvil ransomware attack

July 24, 2021

The software provider Kaseya announced to have obtained a universal decryptor for the REvil ransomware. Earlier this month, a massive...

Read MoreRead more about Kaseya obtained a universal decryptor for REvil ransomware attack
osint
  • News

Threat Report Portugal: Q2 2021

July 24, 2021

The Threat Report Portugal: Q1 2021 compiles data collected on the malicious campaigns that occurred from April to June, Q2,...

Read MoreRead more about Threat Report Portugal: Q2 2021
CVE-prog
  • Vulnerabilities

CVE-2021-28903

July 24, 2021

Summary: A stack overflow in libyang

Read MoreRead more about CVE-2021-28903
CVE-prog
  • Vulnerabilities

CVE-2021-28904

July 24, 2021

Summary: In function ext_get_plugin() in libyang

Read MoreRead more about CVE-2021-28904
CVE-prog
  • Vulnerabilities

CVE-2021-28905

July 24, 2021

Summary: In function lys_node_free() in libyang module can't be NULL. But in some cases, node->module can be null, which triggers...

Read MoreRead more about CVE-2021-28905
CVE-prog
  • Vulnerabilities

CVE-2021-28906

July 24, 2021

Summary: In function read_yin_leaf() in libyang

Read MoreRead more about CVE-2021-28906
CVE-prog
  • Vulnerabilities

CVE-2015-5349

July 24, 2021

Summary: The CSV export in Apache LDAP Studio and Apache Directory Studio before 2.0.0-M10 does not properly escape field values,...

Read MoreRead more about CVE-2015-5349
advert-1
  • News

AvosLocker enters the ransomware scene, asks for partners

July 24, 2021

This blog post was authored by Hasherezade In mid-July we responded to an incident that involved an attack on a...

Read MoreRead more about AvosLocker enters the ransomware scene, asks for partners
osint
  • News

CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack

July 24, 2021

Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group...

Read MoreRead more about CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack
osint
  • News

Busted! Fraud-as-a-Service gang that sold 2FA-proof phishing arrested

July 24, 2021

The Dutch police announced that they arrested two Dutch citizens, aged 24 and 15, for developing and selling phishing panels....

Read MoreRead more about Busted! Fraud-as-a-Service gang that sold 2FA-proof phishing arrested
binary-6475780_1280
  • News

The work of the Runet was tested in the exercise of disconnection from the global network

July 24, 2021

 In June—July, regular exercises on the stability of the Runet were held. This time the possibility of working in conditions...

Read MoreRead more about The work of the Runet was tested in the exercise of disconnection from the global network
sai-kiran-anagani-5Ntkpxqt54Y-unsplash-3
  • News

Global Outage Disrupts the Services of Major Websites

July 24, 2021

 Several major websites faced outages on Thursday due to a glitch in Akamai Technologies Inc's (AKAM.O) systems, the second widespread...

Read MoreRead more about Global Outage Disrupts the Services of Major Websites
pexels-polina-zimmerman-3747139
  • News

New Windows and Linux Flaws: Provide Attackers Highest System Privileges

July 24, 2021

 Two new vulnerabilities, one in Windows and the other in Linux, were discovered on Tuesday, allowing hackers with a presence...

Read MoreRead more about New Windows and Linux Flaws: Provide Attackers Highest System Privileges
petter-lagson-z-upQITw4fY-unsplash2B252812529
  • News

Pulse Security Devices Identified with Malware: Alerts CISA

July 24, 2021

 A detailed warning concerning almost 13 malware samples associated with Pulse Secure operated devices has been issued by the Cybersecurity...

Read MoreRead more about Pulse Security Devices Identified with Malware: Alerts CISA
olympic-games-1608127_1280
  • News

Olympic Ticket Data Leaked, Says Japanese Government

July 24, 2021

 Following a breach, user IDs and passwords for the Tokyo Olympic ticket gateway were released on a leak website, a...

Read MoreRead more about Olympic Ticket Data Leaked, Says Japanese Government
logo_transparent
  • Tools

In0ri – Defacement Detection With Deep Learning

July 24, 2021

In0ri is a defacement detection system utilizing a image-classification convolutional neural network. IntroductionWhen monitoring a website, In0ri will periodically take...

Read MoreRead more about In0ri – Defacement Detection With Deep Learning
TeamsUserEnum_1_enumeration-users
  • Tools

TeamsUserEnum – User Enumeration With Microsoft Teams API

July 24, 2021

Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...

Read MoreRead more about TeamsUserEnum – User Enumeration With Microsoft Teams API
CVE-prog
  • Vulnerabilities

CVE-2020-28010

July 23, 2021

Summary: Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory...

Read MoreRead more about CVE-2020-28010
CVE-prog
  • Vulnerabilities

CVE-2021-3518

July 23, 2021

Summary: There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file...

Read MoreRead more about CVE-2021-3518
CVE-prog
  • Vulnerabilities

CVE-2019-17543

July 23, 2021

Summary: LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with...

Read MoreRead more about CVE-2019-17543
CVE-prog
  • Vulnerabilities

CVE-2021-22884

July 23, 2021

Summary: Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When...

Read MoreRead more about CVE-2021-22884
CVE-prog
  • Vulnerabilities

CVE-2021-22901

July 23, 2021

Summary: curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS...

Read MoreRead more about CVE-2021-22901

Posts pagination

Previous 1 … 3,948 3,949 3,950 3,951 3,952 3,953 3,954 … 4,247 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: exposure-of-personal-ip-address-via-email-micael

July 16, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: IMSSA Manufacturing

July 16, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Morrison Companies

July 16, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Warisan TC Holdings Berhad

July 16, 2025
image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Tra ***

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel