Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Securing Critical Infrastructure in the Digital Age

July 18, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

CVE-2021-3490 – Pwning Linux kernel eBPF on Ubuntu machines

July 31, 2021

Researcher published an exploit code for a high-severity privilege escalation flaw (CVE-2021-3490) in Linux kernel eBPF on Ubuntu machines. The...

Read MoreRead more about CVE-2021-3490 – Pwning Linux kernel eBPF on Ubuntu machines
CVE-prog
  • Vulnerabilities

CVE-2017-17740

July 31, 2021

Summary: contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free...

Read MoreRead more about CVE-2017-17740
CVE-prog
  • Vulnerabilities

CVE-2018-20346

July 31, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20346
CVE-prog
  • Vulnerabilities

CVE-2018-20506

July 31, 2021

Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...

Read MoreRead more about CVE-2018-20506
CVE-prog
  • Vulnerabilities

CVE-2019-1543

July 31, 2021

Summary: ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that...

Read MoreRead more about CVE-2019-1543
CVE-prog
  • Vulnerabilities

CVE-2021-3246

July 31, 2021

Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...

Read MoreRead more about CVE-2021-3246
osint
  • News

LemonDuck no longer settles for breadcrumbs

July 31, 2021

LemonDuck has evolved from a Monero cryptominer into LemonCat, a Trojan that specializes in backdoor installation, credential and data theft,...

Read MoreRead more about LemonDuck no longer settles for breadcrumbs
BEC-recipients-per-role-600x238-1
  • News

Spear-phishing now targets employees outside the finance and executive teams, report says

July 31, 2021

Social engineering attacks have been a longstanding concern for both individuals and organizations alike. The trend, as we know it,...

Read MoreRead more about Spear-phishing now targets employees outside the finance and executive teams, report says
shahadat-rahman-BfrQnKBulYQ-unsplash-4
  • News

Severe Shopify Flaw Exposed GitHub Access Token And Source Code Repositories

July 31, 2021

 Computer science student Augusto Zanellato has earned a $50,000 payday following the discovery of a publicly available GitHub Personal Access...

Read MoreRead more about Severe Shopify Flaw Exposed GitHub Access Token And Source Code Repositories
hacking-2964100_1920
  • News

XAMPP Hosts are Employed to Distribute Agent Tesla

July 31, 2021

 RiskIQ's research team has evaluated the familiar fingerprints campaign in dangerous infrastructure from famous malware families. Their examination of Agent...

Read MoreRead more about XAMPP Hosts are Employed to Distribute Agent Tesla
pexels-panumas-nikhomkhai-1148820
  • News

Malicious Linux Shell Scripts Used to Evade Defenses

July 31, 2021

 Attackers' evasive methods stretch back to the times when base64 and other popular encoding schemes were utilized. New Linux shell script...

Read MoreRead more about Malicious Linux Shell Scripts Used to Evade Defenses
computer-1446108_1280
  • News

UBEL is the Android Malware Successor to Oscorp

July 31, 2021

 As part of a fresh campaign that began in May 2021, an Android malware that was discovered misusing accessibility features...

Read MoreRead more about UBEL is the Android Malware Successor to Oscorp
LightMe_1_screen-702082
  • Tools

LightMe – HTTP Server Serving Obfuscated Powershell Scripts/Payloads

July 31, 2021

LightMe is a Simple HTTP Server serving Powershell Scripts/Payloads after Obfuscate them and run obfuscation as a service in backgroud...

Read MoreRead more about LightMe – HTTP Server Serving Obfuscated Powershell Scripts/Payloads
rtl_433_1_screenshot-793244
  • Tools

Rtl_433 – Program To Decode Radio Transmissions From Devices On The ISM Bands (And Other Frequencies)

July 31, 2021

rtl_433 (despite the name) is a generic data receiver, mainly for the 433.92 MHz, 868 MHz (SRD), 315 MHz, 345...

Read MoreRead more about Rtl_433 – Program To Decode Radio Transmissions From Devices On The ISM Bands (And Other Frequencies)
osint
  • News

Estonia ‘s police arrested a Tallin resident who stole 286K ID scans from a government DB

July 30, 2021

Estonia ‘s police arrested a man from Tallinn that is suspected to be the hacker who stole 286K ID scans...

Read MoreRead more about Estonia ‘s police arrested a Tallin resident who stole 286K ID scans from a government DB
osint
  • News

Meteor was the wiper used against Iran’s national railway system

July 30, 2021

The recent attack against Iran’s national railway system was caused by a wiper malware dubbed Meteor and not by a ransomware as initially thought....

Read MoreRead more about Meteor was the wiper used against Iran’s national railway system
osint
  • News

BlackMatter and Haron, two new ransomware gangs in the threat landscape

July 30, 2021

The cyber threat landscape change continuously, recently two new ransomware-as-service (RaaS) operations named BlackMatter and Haron made the headlines. Recently,...

Read MoreRead more about BlackMatter and Haron, two new ransomware gangs in the threat landscape
CVE-prog
  • Vulnerabilities

CVE-2021-34516

July 30, 2021

Summary: Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34449. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34516 CVSS Score (if...

Read MoreRead more about CVE-2021-34516
CVE-prog
  • Vulnerabilities

CVE-2021-35331

July 30, 2021

Summary: ** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted...

Read MoreRead more about CVE-2021-35331
CVE-prog
  • Vulnerabilities

CVE-2020-21934

July 30, 2021

Summary: An issue was discovered in Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n where authentication to download the Syslog...

Read MoreRead more about CVE-2020-21934
CVE-prog
  • Vulnerabilities

CVE-2021-21406

July 30, 2021

Summary: Combodo iTop is an open source, web based IT Service Management tool. In versions prior to 2.7.4, there is...

Read MoreRead more about CVE-2021-21406
CVE-prog
  • Vulnerabilities

CVE-2020-21933

July 30, 2021

Summary: An issue was discovered in Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n where the admin password and private...

Read MoreRead more about CVE-2020-21933
osint
  • News

Microsoft provides more mitigation instructions for the PetitPotam attack

July 30, 2021

In a revision of KnowledgeBase article KB5005413, Microsoft has provided more elaborate mitigation instructions for the PetitPotam attacks that were...

Read MoreRead more about Microsoft provides more mitigation instructions for the PetitPotam attack
decoy-2-1
  • News

Crimea “manifesto” deploys VBA Rat using double attack vectors

July 30, 2021

This blog post was authored by Hossein Jazi. On July 21, 2021, we identified a suspicious document named “Манифест.docx” (“Manifest.docx”)...

Read MoreRead more about Crimea “manifesto” deploys VBA Rat using double attack vectors

Posts pagination

Previous 1 … 3,950 3,951 3,952 3,953 3,954 3,955 3,956 … 4,254 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hkcert
  • HKCERT
  • News

Ubuntu Linux Kernel Multiple Vulnerabilities

July 18, 2025
hkcert
  • HKCERT
  • News

F5 Products Denial of Service Vulnerability

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7757

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7756

July 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-23269

July 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel