Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
uafuzz_1_logo
  • News

UAFuzz – Binary-level Directed Fuzzing For Use-After-Free Vulnerabilities

November 25, 2020

Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to...

Read MoreRead more about UAFuzz – Binary-level Directed Fuzzing For Use-After-Free Vulnerabilities
Xerror_1
  • News

Xerror – Fully Automated Pentesting Tool

November 25, 2020

Xerror is an automated penetration tool , which will helps security professionals and non professionals to automate their pentesting tasks....

Read MoreRead more about Xerror – Fully Automated Pentesting Tool
CVE-2020-7378-OpenCRX-Unverified-Password-Change
  • News

CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)

November 25, 2020

OpenCRX version 4.30 and version 5.0-20200717 suffers from an unverified password change vulnerability, which is an instance of CWE-620. This...

Read MoreRead more about CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)
osint
  • News

Lock and Code S1Ep20: Tracking the charities that track you online with Chris Boyd

November 24, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep20: Tracking the charities that track you online with Chris Boyd
osint
  • News

Interview Spotlight: Israeli Hardware Solutions, Sepio Systems

November 24, 2020

On 19 November, E-Hacking News conducted an interesting interview with Sepio Systems. The company provides its customers with the highest...

Read MoreRead more about Interview Spotlight: Israeli Hardware Solutions, Sepio Systems
toothpicker_1_toothpicker
  • News

ToothPicker – An In-Process, Coverage-Guided Fuzzer For iOS

November 24, 2020

ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically targets iOS's Bluetooth daemon bluetoothd and to...

Read MoreRead more about ToothPicker – An In-Process, Coverage-Guided Fuzzer For iOS
osi.ig_1_20191103_233944
  • News

Osi.Ig – Information Gathering Instagram

November 24, 2020

The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to...

Read MoreRead more about Osi.Ig – Information Gathering Instagram
osint
  • Vulnerabilities

SEC Consult SA-20201123-0 :: Multiple Vulnerabilities in ZTE WLAN router MF253V

November 24, 2020

Posted by SEC Consult Vulnerability Lab on Nov 23SEC Consult Vulnerability Lab Security Advisory < 20201123-0 > ======================================================================= title: Multiple...

Read MoreRead more about SEC Consult SA-20201123-0 :: Multiple Vulnerabilities in ZTE WLAN router MF253V
osint
  • Vulnerabilities

CA20201116-01: Security Notice for CA Unified Infrastructure Management

November 24, 2020

Posted by Ken Williams via Fulldisclosure on Nov 23CA20201116-01: Security Notice for CA Unified Infrastructure Management Issued: November 16th, 2020...

Read MoreRead more about CA20201116-01: Security Notice for CA Unified Infrastructure Management
Cloud
  • News

Don’t Let These Top Cloud Myths Hamper Your Business Decision-Making

November 24, 2020

The cloud remains a dominant technology innovation well into its second decade of existence. However, after all this time, certain...

Read MoreRead more about Don’t Let These Top Cloud Myths Hamper Your Business Decision-Making
NICER-Protocol-Deep-Dive-Internet-Exposure-of-Microsoft-SQL-Server-MS-SQL-UDP_1434-
  • News

NICER Protocol Deep Dive: Internet Exposure of Microsoft SQL Server (MS SQL) (UDP/1434)

November 24, 2020

Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...

Read MoreRead more about NICER Protocol Deep Dive: Internet Exposure of Microsoft SQL Server (MS SQL) (UDP/1434)
IMG_20201122_202842
  • News

WhatsApp’s ‘disappearing messages’ now available for Indian users; here’s how you can enable disappearing messages on your WhatsApp

November 23, 2020

 The much popular messaging application earlier announced that they will be rolling out a new 'Disappearing Messages' feature, where sent...

Read MoreRead more about WhatsApp’s ‘disappearing messages’ now available for Indian users; here’s how you can enable disappearing messages on your WhatsApp
1046562498.0
  • News

Manchester United Hit By a Cyber Attack on their Systems

November 23, 2020

 Manchester United affirmed the hacking on the club and revealed systems required for the match remained secure.Have been hit by...

Read MoreRead more about Manchester United Hit By a Cyber Attack on their Systems
amlsec
  • News

Amlsec – Automated Security Risk Identification Using AutomationML-based Engineering Data

November 23, 2020

This prototype identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts....

Read MoreRead more about Amlsec – Automated Security Risk Identification Using AutomationML-based Engineering Data
siras_1_deployment
  • News

SIRAS – Security Incident Response Automated Simulations

November 23, 2020

Security Incident Response Automated Simulations (SIRAS) are internal/controlled actions that provide a structured opportunity to practice the incident response plan...

Read MoreRead more about SIRAS – Security Incident Response Automated Simulations
Fuzzilli
  • News

Fuzzilli – A JavaScript Engine Fuzzer

November 22, 2020

A (coverage-)guided fuzzer for dynamic language interpreters based on a custom intermediate language ("FuzzIL") which can be mutated and translated...

Read MoreRead more about Fuzzilli – A JavaScript Engine Fuzzer
routopsy
  • News

Routopsy – A Toolkit Built To Attack Often Overlooked Networking Protocols

November 22, 2020

Routopsy is a toolkit built to attack often overlooked networking protocols. Routopsy currently supports attacks against Dynamic Routing Protocols (DRP)...

Read MoreRead more about Routopsy – A Toolkit Built To Attack Often Overlooked Networking Protocols
Seoul_South_Korea-1024x683-1
  • News

Websites requiring security software downloads opened door to supply chain attack

November 21, 2020

The Seoul skyline in South Korea (Flickr – Laurie Nevayhttps://www.flickr.com/photos/laurienevay/, CC BY-SA 2.0 https://creativecommons.org/licenses/by-sa/2.0, via Wikimedia Commons).A newly reported supply...

Read MoreRead more about Websites requiring security software downloads opened door to supply chain attack
osint
  • News

With Black Friday-Cyber Monday looming, Grelos skimmer tied to Magecart poses threat

November 21, 2020

A new Grelos skimmer variant tied to Magecart Group could potentially lure online shoppers to fill out phony payment forms...

Read MoreRead more about With Black Friday-Cyber Monday looming, Grelos skimmer tied to Magecart poses threat
osint
  • News

Black Friday 2020: How to shop safely online

November 21, 2020

Black Friday 2020 promises to be somewhat different from years gone by thanks to COVID-19. The annual surge of in-store...

Read MoreRead more about Black Friday 2020: How to shop safely online
hacked_
  • News

Demystifying two common misconceptions with e-commerce security

November 21, 2020

Online shopping has seen a dramatic increase in the months following the Covid-19 outbreak as more and more people opt-out...

Read MoreRead more about Demystifying two common misconceptions with e-commerce security
hacker-3342696_1280
  • News

A quick look into malwares that installs ransomware : Remove them form your system immediately

November 21, 2020

  We recently looked into ways phishing mails are evolving, attackers getting creative by the day. But a new trend...

Read MoreRead more about A quick look into malwares that installs ransomware : Remove them form your system immediately
security-4038164_960_720
  • News

Managed.com Hosting Provider Hit by REvil Ransomware, $500K Ransom Demand

November 21, 2020

Managed hosting provider Managed.com has temporarily taken down all its servers and web hosting systems offline including clients' websites in...

Read MoreRead more about Managed.com Hosting Provider Hit by REvil Ransomware, $500K Ransom Demand
Americold-1280x640-1
  • News

Ransomware Attack Takes Down Massive Food-Supply Chain Providing Distribution of Temperature-Sensitive COVID-19 Vaccines

November 21, 2020

  A company whose cold-storage capacities are extremely integral to the U.S. food-supply chain and the Coronavirus vaccine distribution affirmed...

Read MoreRead more about Ransomware Attack Takes Down Massive Food-Supply Chain Providing Distribution of Temperature-Sensitive COVID-19 Vaccines

Posts pagination

Previous 1 … 3,954 3,955 3,956 3,957 3,958 3,959 3,960 … 4,066 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2024-13793

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3419

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-32873

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4127

May 10, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 150[.]158[.]108[.]220:443

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel