Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
kali-whoami_1-724043
  • Tools

Kali-Whoami – A Privacy Tool Developed To Keep You Anonymous On Kali Linux At The Highest Level

July 17, 2021

The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly...

Read MoreRead more about Kali-Whoami – A Privacy Tool Developed To Keep You Anonymous On Kali Linux At The Highest Level
exploit_mitigations_1_example-749208
  • Tools

Exploit_Mitigations – Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions

July 17, 2021

The goal is to list exploitation mitigations added over time in various operating systems, software, libraries or hardware. It becomes...

Read MoreRead more about Exploit_Mitigations – Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions
osint
  • News

Microsoft alerts about a new Windows Print Spooler vulnerability

July 16, 2021

Microsoft published guidance to mitigate the impact of a new Windows Print Spooler vulnerability tracked as CVE-2021-34481 that was disclosed...

Read MoreRead more about Microsoft alerts about a new Windows Print Spooler vulnerability
osint
  • News

Google Chrome 91.0.4472.164 fixes a new zero-day exploited in the wild

July 16, 2021

Google Chrome 91.0.4472.164 addresses seven security vulnerabilities, including a high severity zero-day flaw exploited in the wild. Google has released...

Read MoreRead more about Google Chrome 91.0.4472.164 fixes a new zero-day exploited in the wild
osint
  • News

New enhanced Joker Malware samples appear in the threat landscape

July 16, 2021

The Joker malware is back, experts spotted multiple malicious apps on the official Google Play store that were able to...

Read MoreRead more about New enhanced Joker Malware samples appear in the threat landscape
osint
  • News

Israeli surveillance firm Candiru used Windows zero-days to deploy spyware

July 16, 2021

Experts said that Israeli surveillance firm Candiru, tracked as Sourgum, exploited zero-days to deliver a new Windows spyware. Microsoft and...

Read MoreRead more about Israeli surveillance firm Candiru used Windows zero-days to deploy spyware
osint
  • News

Exploit broker Zerodium is looking for VMware vCenter Server exploits

July 16, 2021

Zero-day exploit broker Zerodium is looking for 0day exploits for the VMware vCenter Server Zero-day exploit broker Zerodium announced it...

Read MoreRead more about Exploit broker Zerodium is looking for VMware vCenter Server exploits
osint
  • News

SpearTip Finds New Diavol Ransomware Does Steal Data

July 16, 2021

Security researchers have linked a new ransomware strain called Diavol to the Wizard Spider threat group behind the Trickbot botnet....

Read MoreRead more about SpearTip Finds New Diavol Ransomware Does Steal Data
CVE-prog
  • Vulnerabilities

CVE-2021-33773

July 16, 2021

Summary: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-34445, CVE-2021-34456. Reference...

Read MoreRead more about CVE-2021-33773
CVE-prog
  • Vulnerabilities

CVE-2021-33772

July 16, 2021

Summary: Windows TCP/IP Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-31183, CVE-2021-34490. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33772...

Read MoreRead more about CVE-2021-33772
CVE-prog
  • Vulnerabilities

CVE-2021-33771

July 16, 2021

Summary: Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31979, CVE-2021-34514. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33771 CVSS...

Read MoreRead more about CVE-2021-33771
CVE-prog
  • Vulnerabilities

CVE-2021-33768

July 16, 2021

Summary: Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34470, CVE-2021-34523. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33768...

Read MoreRead more about CVE-2021-33768
CVE-prog
  • Vulnerabilities

CVE-2021-33766

July 16, 2021

Summary: Microsoft Exchange Information Disclosure Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33766 https://www.zerodayinitiative.com/advisories/ZDI-21-798/ CVSS Score (if available) v2: / MEDIUM v3: /...

Read MoreRead more about CVE-2021-33766
osint
  • News

SonicWall warns users of “imminent ransomware campaign”

July 16, 2021

SonicWall has issued an urgent security notice warning users of unpatched End-Of-Life (EOL) SRA & SMA 8.X remote access devices...

Read MoreRead more about SonicWall warns users of “imminent ransomware campaign”
marked-MB3-2021-06-15-15-55-55-346x600-1
  • News

Ransomware’s Russia problem

July 16, 2021

This blog post was written in collaboration with members of the Threat Intelligence Team. Last week, US news outlet NBC...

Read MoreRead more about Ransomware’s Russia problem
fingers-5946228_1280
  • News

ESET: new generation viruses will be able to imitate human behavior

July 16, 2021

Experts have named the main cyberthreats posed by the spread of artificial intelligence (AI) technologiesAnalysts predict the growth of the...

Read MoreRead more about ESET: new generation viruses will be able to imitate human behavior
adi-goldstein-EUsVwEOsblE-unsplash-2
  • News

Chinese Hackers Exploit New SolarWinds Zero-Day in Targeted Attacks

July 16, 2021

 Microsoft Threat Intelligence Centre (MSTIC) on Tuesday revealed a zero-day remote code execution exploit, being used to attack SolarWinds Serv-U...

Read MoreRead more about Chinese Hackers Exploit New SolarWinds Zero-Day in Targeted Attacks
pexels-fotografierende-2838511
  • News

Updated Joker Malware Floods into Android Apps

July 16, 2021

 The Joker mobile virus has made its entry back on Google Play with an increase in malicious Android apps that...

Read MoreRead more about Updated Joker Malware Floods into Android Apps
hacker-2300772_1920-1
  • News

APT Malicious Campaigns Target Asian Entities

July 16, 2021

 Researchers from Kaspersky have reported that hundreds of individuals from South East Asia, including Myanmar and the government of the...

Read MoreRead more about APT Malicious Campaigns Target Asian Entities
hacker-2300772_1920
  • News

Criminals Targeted Security Gaps at Financial Services Firms as Employees Moved to WFH

July 16, 2021

 According to a report released on Tuesday by the international Financial Stability Board (FSB), criminals targeted security flaws at financial...

Read MoreRead more about Criminals Targeted Security Gaps at Financial Services Firms as Employees Moved to WFH
Ventoy_5-791144
  • Tools

Ventoy – A New Bootable USB Solution

July 16, 2021

Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With ventoy, you don't need to...

Read MoreRead more about Ventoy – A New Bootable USB Solution
redteam-hardware-toolkit_1_main-767324
  • Tools

Redteam-Hardware-Toolkit – Red Team Hardware Toolkit

July 16, 2021

A collection of hardware s that aid in red team operations. This repository will help you during red team engagement....

Read MoreRead more about Redteam-Hardware-Toolkit – Red Team Hardware Toolkit
osint
  • News

SonicWall warns of ‘imminent ransomware’ attacks on its EOL products

July 15, 2021

SonicWall has issued an urgent security alert to warn customers of “an imminent ransomware campaing” targeting EOL equipment. SonicWall has...

Read MoreRead more about SonicWall warns of ‘imminent ransomware’ attacks on its EOL products
osint
  • News

macOS: Bashed Apples of Shlayer and Bundlore

July 15, 2021

Uptycs threat research team analyzed macOS malware threat landscape and discovered that Shlayer and Bundlore are the most predominant malware....

Read MoreRead more about macOS: Bashed Apples of Shlayer and Bundlore

Posts pagination

Previous 1 … 3,952 3,953 3,954 3,955 3,956 3,957 3,958 … 4,245 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
HIBP-Banner-1
  • Data Breach

MaReads – 74,453 breached accounts

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7600

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7596

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7597

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel