Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Alleged docs relating to Covid-19 vaccine leaked in darkweb

January 1, 2021

Experts from threat intelligence firm Cyble have found documents relating to Covid-19 vaccine of European Medicines Agency in the Darkweb...

Read MoreRead more about Alleged docs relating to Covid-19 vaccine leaked in darkweb
osint
  • News

SolarWinds hackers gained access to Microsoft source code

January 1, 2021

The threat actors behind the SolarWinds supply chain attack could have had access to the source code of several Microsoft...

Read MoreRead more about SolarWinds hackers gained access to Microsoft source code
osint
  • News

Threat actor is selling 368.8 million records from 26 data breaches

January 1, 2021

A data breach broker is selling user records allegedly from twenty-six data breaches on a hacker forum. Security experts from...

Read MoreRead more about Threat actor is selling 368.8 million records from 26 data breaches
fakesite-600x433-1
  • News

The strangest cybersecurity events of 2020: a look back

January 1, 2021

This year is finally coming to an end, and it only took us about eight consecutive months of March to...

Read MoreRead more about The strangest cybersecurity events of 2020: a look back
pexels-photo-374559
  • News

Data Breach: Stolen User Records from 26 Companies Being Sold Online

January 1, 2021

 A data broker has been allegedly selling stolen user data of twenty-six companies on a hacker forum. Reportedly, the hacker...

Read MoreRead more about Data Breach: Stolen User Records from 26 Companies Being Sold Online
coins-currency-investment-insurance-128867
  • News

Crypto Trading App Voyager Hit By Cyberattack, Company Shuts Down Website

January 1, 2021

 Cryptocurrency brokerage platform Voyager stopped its operations on 28th December after it suffered a  cyberattack that disrupted its DNS configuration....

Read MoreRead more about Crypto Trading App Voyager Hit By Cyberattack, Company Shuts Down Website
Happy New Year
  • News

Happy New Year 2021 from RedPacket Security

January 1, 2021

Hopefully, when this post goes out at the start of the New Year of 2021 (UK Time at least), no...

Read MoreRead more about Happy New Year 2021 from RedPacket Security
osint
  • News

New Golang-based Crypto worm infects Windows and Linux servers

December 31, 2020

Experts from Intezer discovered a new and self-spreading Golang-based malware that targets Windows and Linux servers. Experts from Intezer discovered...

Read MoreRead more about New Golang-based Crypto worm infects Windows and Linux servers
osint
  • News

Emotet campaign hits Lithuania’s National Public Health Center and several state institutions

December 31, 2020

An Emotet campaign hit Lithuania, the malware has infected systems at the National Center for Public Health (NVSC) and several...

Read MoreRead more about Emotet campaign hits Lithuania’s National Public Health Center and several state institutions
osint
  • News

T-Mobile data breach: CPNI (Customer Proprietary Network Information) exposed

December 31, 2020

T-Mobile has disclosed a data breach that exposed customers’ network information (CPNI), including phone numbers and calls records. T-Mobile has...

Read MoreRead more about T-Mobile data breach: CPNI (Customer Proprietary Network Information) exposed
osint
  • News

CISA demands US govt agencies to update SolarWinds Orion software

December 31, 2020

US Cybersecurity and Infrastructure Security Agency (CISA) urges US federal agencies to update the SolarWinds Orion software by the end...

Read MoreRead more about CISA demands US govt agencies to update SolarWinds Orion software
GettyImages-72266809-e1604954206455-1024x614-1
  • News

New Golang worm turns Windows and Linux servers into monero miners

December 31, 2020

Oracle Co-Founder Larry Ellison delivers a keynote address at the Oracle OpenWorld conference in 2006. A newly discovered worm turns...

Read MoreRead more about New Golang worm turns Windows and Linux servers into monero miners
WHO_-455x600-1
  • News

The most enticing cyberattacks of 2020

December 31, 2020

In 2020, we experienced a major shift. Much of the world pitched in to limit the spread of the coronavirus,...

Read MoreRead more about The most enticing cyberattacks of 2020
binary-2170630_1280
  • News

Kaspersky has reported hacker attacks on COVID-19 researchers

December 31, 2020

The hacker group Lazarus attacked the developers of the coronavirus vaccine: the Ministry of Health and a pharmaceutical company in...

Read MoreRead more about Kaspersky has reported hacker attacks on COVID-19 researchers
Metasploit-2020-Wrap-Up2
  • News

Metasploit 2020 Wrap-Up

December 31, 2020

2020 was certainly an interesting year. There were quite a few newsworthy events and some fantastic exploit content released. Let’s...

Read MoreRead more about Metasploit 2020 Wrap-Up
image-133
  • Tutorials

Whitelisting an IP address in ModSecurity , WordPress troubleshooting, integration and automation.

December 30, 2020

I have been recently been using Integromat.com for some automation and integration work. IF you are wondering what it is,...

Read MoreRead more about Whitelisting an IP address in ModSecurity , WordPress troubleshooting, integration and automation.
google
  • News

Google Docs bug could have allowed hackers to hijack screenshots

December 30, 2020

Google has addressed a bug in its feedback tool incorporated across its services that could have allowed attackers to view...

Read MoreRead more about Google Docs bug could have allowed hackers to hijack screenshots
image-132
  • News

Discord Channel now available.

December 30, 2020

I have received a couple of request recently to create a discord channel but had never really had the time...

Read MoreRead more about Discord Channel now available.
osint
  • News

US Treasury warns of ransomware attacks on COVID-19 vaccine research

December 30, 2020

The US Treasury Department’s Financial Crimes Enforcement Network (FinCEN) warns of ransomware attacks on COVID-19 vaccine research organizations. The US...

Read MoreRead more about US Treasury warns of ransomware attacks on COVID-19 vaccine research
osint
  • News

SolarWinds hackers aimed at access to victims’ cloud assets

December 30, 2020

Microsoft says that SolarWinds hackers aimed at compromising the victims’ cloud infrastructure after deploying the Solorigate backdoor (aka Sunburst). The...

Read MoreRead more about SolarWinds hackers aimed at access to victims’ cloud assets
hacker-1944688_1280
  • News

Declaring War Against Cyber Negligence

December 30, 2020

Amidst perhaps the most widespread and impactful cyberattack in history, American businesses and government agencies alike must take a drastically...

Read MoreRead more about Declaring War Against Cyber Negligence
hacker-1725256_1280-1
  • News

The head of Group-IB Mr. Sachkov described the portrait of a typical Russian hacker

December 30, 2020

Not only a programmer but also just a specialist with a good knowledge of mathematics can become a hacker in...

Read MoreRead more about The head of Group-IB Mr. Sachkov described the portrait of a typical Russian hacker
abstract-city-990x400-1
  • News

Digital Footprint Intelligence Report

December 29, 2020

Introduction The Digital Footprint Intelligence Service announces the results of research on the digital footprints of governmental, financial and industrial...

Read MoreRead more about Digital Footprint Intelligence Report
websitew-300x159-1
  • News

SearchDimension search hijackers: An overview of developments

December 29, 2020

Background information on SearchDimension SearchDimension is the name of a family of browser hijackers that makes money from ad clicks...

Read MoreRead more about SearchDimension search hijackers: An overview of developments

Posts pagination

Previous 1 … 3,958 3,959 3,960 3,961 3,962 3,963 3,964 … 4,087 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[STORMOUS] – Ransomware Victim: thewatermansarms[.]net

May 21, 2025
image
  • Data Breach
  • Ransomware

[STORMOUS] – Ransomware Victim: crystalhotels[.]com[.]tr

May 21, 2025
image
  • Data Breach
  • Ransomware

[STORMOUS] – Ransomware Victim: www[.]axxoshotels[.]com

May 21, 2025
image
  • Data Breach
  • Ransomware

[STORMOUS] – Ransomware Victim: www[.]wirebangkok[.]com

May 21, 2025
image
  • Data Breach
  • Ransomware

[STORMOUS] – Ransomware Victim: nirvanahotels[.]com[.]tr

May 21, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel