Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Vermont Hospital confirmed the ransomware attack

December 27, 2020

The Burlington-based University of Vermont Health Network has finally admitted that ransomware was behind the October attack. In October, threat...

Read MoreRead more about Vermont Hospital confirmed the ransomware attack
osint
  • News

Security Affairs newsletter Round 294

December 27, 2020

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...

Read MoreRead more about Security Affairs newsletter Round 294
1f973
  • News

HackerOne announces first bug hunter to earn more than $2M in bug bounties

December 27, 2020

White hat hacker could be a profitable profession, Cosmin Iordache earned more than $2M reporting flaws through the bug bounty...

Read MoreRead more about HackerOne announces first bug hunter to earn more than $2M in bug bounties
osint
  • News

SolarWinds releases updated advisory for SUPERNOVA backdoor

December 27, 2020

SolarWinds released an updated advisory for the SuperNova malware discovered while investigating the recent supply chain attack. SolarWinds has released...

Read MoreRead more about SolarWinds releases updated advisory for SUPERNOVA backdoor
osint
  • News

GoDaddy apologized for insensitive phishing email sent to its employees offering a fake bonus

December 27, 2020

GoDaddy made the headlines for an initiative that is dividing cybersecurity community, it sent phishing messages offering bonuses to its...

Read MoreRead more about GoDaddy apologized for insensitive phishing email sent to its employees offering a fake bonus
image-79
  • Hack The Box
  • Premium Members Content
  • Tutorials

Hack The Box Walkthrough Guide To: Omni

December 27, 2020

Disclaimer: I do NOT want you to read this if you have not even tried to attempt any of it...

Read MoreRead more about Hack The Box Walkthrough Guide To: Omni
internet-search-engine-1433323_1280
  • News

Kaspersky Lab and Yandex have detected malicious browser extensions

December 27, 2020

 Kaspersky Lab and Yandex have identified malicious code in browser extensions. Through them, attackers could gain access to the account...

Read MoreRead more about Kaspersky Lab and Yandex have detected malicious browser extensions
trukno
  • News

TruKno TTP based Threat Intelligence Platform

December 27, 2020

TruKno’s ThreatBoard is a platform that helps security professionals uncover the root causes behind emerging cyber-attacks, Improving proactive defense postures.....

Read MoreRead more about TruKno TTP based Threat Intelligence Platform
social-analyzer_1_socialanalyzerlogo
  • News

Social-Analyzer – API And Web App For Analyzing And Finding A Person Profile Across +300 Social Media Websites (Detections Are Updated Regularly)

December 27, 2020

An API for analyzing & finding a person profile across +300 social media websites. It includes different string analysis and...

Read MoreRead more about Social-Analyzer – API And Web App For Analyzing And Finding A Person Profile Across +300 Social Media Websites (Detections Are Updated Regularly)
apkleaks_3
  • News

ApkLeaks – Scanning APK File For URIs, Endpoints And Secrets

December 27, 2020

Scanning APK file for URIs, endpoints & secrets.InstallationTo install apkLeaks, simply: $ git clone https://github.com/dwisiswant0/apkleaks$ cd apkleaks/$ pip install -r...

Read MoreRead more about ApkLeaks – Scanning APK File For URIs, Endpoints And Secrets
image-50
  • Tutorials

How to install Tilix on Kali Linux

December 26, 2020

Do you love using Tilix, but found that the latest version of Kali Linux doesn't seem to support installing it...

Read MoreRead more about How to install Tilix on Kali Linux
osint
  • News

The Emotet botnet is back and hits 100K recipients per day

December 26, 2020

Emotet is back on Christmas Eve, cybercrime operators are sending out spam messages to deliver the infamous Trickbot Trojan. Emotet...

Read MoreRead more about The Emotet botnet is back and hits 100K recipients per day
osint
  • News

REvil gang threatens to release intimate pictures of celebs who are customers of The Hospital Group

December 26, 2020

REvil ransomware gang, aka Sodinokibi, hacked The Hospital Group and threatens to release before-and-after pictures of celebrity clients. The Hospital...

Read MoreRead more about REvil gang threatens to release intimate pictures of celebs who are customers of The Hospital Group
osint
  • News

CrowdStrike releases free Azure tool to review assigned privileges

December 26, 2020

CrowdStrike released a free Azure security tool after it was notified by Microsoft of a failed attack leveraging compromised Azure...

Read MoreRead more about CrowdStrike releases free Azure tool to review assigned privileges
osint
  • News

North Korea-linked Lazarus APT targets the COVID-19 research

December 26, 2020

The North Korea-linked Lazarus APT group has recently launched cyberattacks against at least two organizations involved in COVID-19 research. The...

Read MoreRead more about North Korea-linked Lazarus APT targets the COVID-19 research
image-48
  • Hack The Box
  • Premium Members Content
  • Tutorials

Hack The Box Walkthrough Guide To: Academy

December 26, 2020

Disclaimer: I do NOT want you to read this if you have not even tried to attempt any of it...

Read MoreRead more about Hack The Box Walkthrough Guide To: Academy
Internet2Bof2BThings
  • News

URL Spoofing: Interview With Bug Bounty Hunter Narendra Bhati

December 26, 2020

On 24th December, E-Hacking News conducted an interesting interview with Mr. Narendra Bhati, a Bug Bounty Hunter/Ethical Hacker. He was...

Read MoreRead more about URL Spoofing: Interview With Bug Bounty Hunter Narendra Bhati
osint
  • Vulnerabilities

Re: [FD] CVE-2020-8150 – Remote Code Execution as SYSTEM/root via Backblaze

December 26, 2020

Posted by Reed Loden on Dec 25Due to a process fail, this CVE ID was accidentally reused for another vulnerability....

Read MoreRead more about Re: [FD] CVE-2020-8150 – Remote Code Execution as SYSTEM/root via Backblaze
osint
  • Vulnerabilities

Re: [FD] CVE-2020-8152 – Elevation of Privilege in Backblaze

December 26, 2020

Posted by Reed Loden on Dec 25Due to a process fail, this CVE ID was accidentally reused for another vulnerability....

Read MoreRead more about Re: [FD] CVE-2020-8152 – Elevation of Privilege in Backblaze
osint
  • Vulnerabilities

CarolinaCon Online CFP

December 26, 2020

Posted by CarolinaCon on Dec 25We hope this email finds you well. This year has had its challenges and we...

Read MoreRead more about CarolinaCon Online CFP
osint
  • Vulnerabilities

[CVE-2018-7580] – Philips Hue Denial of Service

December 26, 2020

Posted by Ilia Shnaidman on Dec 25 Credits: Ilia Shnaidman @0x496c on Twitter https://www.iliashn.com Vendor: ============= Philips Lighting Holding B.V...

Read MoreRead more about [CVE-2018-7580] – Philips Hue Denial of Service
osint
  • Vulnerabilities

Re: [FD] CVE-2020-8152 – Elevation of Privilege in Backblaze

December 26, 2020

Posted by Jason Geffner on Dec 25Thanks, Reed. I've updated the GitHub repository name to reflect this change. The detailed...

Read MoreRead more about Re: [FD] CVE-2020-8152 – Elevation of Privilege in Backblaze
aura_1_logotype
  • News

Aura – Python Source Code Auditing And Static Analysis On A Large Scale

December 26, 2020

Aura is a static analysis framework developed as a response to the ever-increasing threat of malicious packages and vulnerable code...

Read MoreRead more about Aura – Python Source Code Auditing And Static Analysis On A Large Scale
vulmap
  • News

Vulmap – Web Vulnerability Scanning And Verification Tools

December 26, 2020

Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS...

Read MoreRead more about Vulmap – Web Vulnerability Scanning And Verification Tools

Posts pagination

Previous 1 … 3,959 3,960 3,961 3,962 3,963 3,964 3,965 … 4,087 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

134577a532b0541acf72773f8cbcb1ad326d467b27a5a1778bde066e77c830bc
  • News

Darpa Zaps Popcorn With Laser Power Beamed 5.3 Miles Through Air

May 21, 2025
cd1b1e81757a0d3bb4bebd71e38105ad4dc3123e3f47b53ee35d44dbb3f6193d
  • News

Torvalds’ Typing Taste Test Touches Tactile Tragedy

May 21, 2025
720b1ed7db8ac8dfbfe440012fedf19f002360ded34806158ac4c3fa48720f77
  • News

European Customers Report Oracle Cloud Identity Outage, Big Red Is Silent

May 21, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5002

May 21, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4998

May 21, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel