Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025
unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
r77-rootkit_1
  • Tools

R77-Rootkit – Fileless Ring 3 Rootkit With Installer And Persistence That Hides Processes, Files, Network Connections, Etc…

May 15, 2021

Ring 3 rootkitr77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named pipes,...

Read MoreRead more about R77-Rootkit – Fileless Ring 3 Rootkit With Installer And Persistence That Hides Processes, Files, Network Connections, Etc…
osint
  • News

Magecart gang hides PHP-based web shells in favicons

May 14, 2021

Magecart cybercrime gang is using favicon to hide malicious PHP web shells used to maintain remote access to inject JavaScript...

Read MoreRead more about Magecart gang hides PHP-based web shells in favicons
osint
  • News

Ireland’s Health Service Executive hit by ransomware attack

May 14, 2021

Ireland’s Health Service Executive service shut down its IT systems after they were hit with a “significant ransomware attack.” Another major...

Read MoreRead more about Ireland’s Health Service Executive hit by ransomware attack
osint
  • News

Colonial Pipeline likely paid a $5M ransom to DarkSide

May 14, 2021

DarkSide demanded a $5 million ransom to Colonial Pipeline, which has quickly recovered operations, did it pay? The Colonial Pipeline...

Read MoreRead more about Colonial Pipeline likely paid a $5M ransom to DarkSide
osint
  • News

Rapid7 says source code, credentials accessed as a result of Codecov supply-chain attack

May 14, 2021

Rapid7 disclosed that unauthorized third-party had access to source code and customer data as result of Codecov supply chain attack....

Read MoreRead more about Rapid7 says source code, credentials accessed as a result of Codecov supply-chain attack
osint
  • News

Security at Bay: Critical Infrastructure Under Attack

May 14, 2021

The recent Colonial Pipeline attack highlights the dangers that are facing Critical Infrastructure worldwide. The attack perpetrated by hackers on...

Read MoreRead more about Security at Bay: Critical Infrastructure Under Attack
osint
  • News

Please vote Security Affairs – 1 day left

May 14, 2021

Hi GuysI need your support. I became aware only not that we can nominate SecurityAffairs as Best Personal Blog. I...

Read MoreRead more about Please vote Security Affairs – 1 day left
CVE-prog
  • Vulnerabilities

CVE-2021-31165

May 14, 2021

Summary: Windows Container Manager Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31167, CVE-2021-31168, CVE-2021-31169, CVE-2021-31208. Reference...

Read MoreRead more about CVE-2021-31165
CVE-prog
  • Vulnerabilities

CVE-2021-31170

May 14, 2021

Summary: Windows Graphics Component Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31188. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31170 https://www.zerodayinitiative.com/advisories/ZDI-21-578/...

Read MoreRead more about CVE-2021-31170
CVE-prog
  • Vulnerabilities

CVE-2021-1506

May 14, 2021

Summary: Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain...

Read MoreRead more about CVE-2021-1506
CVE-prog
  • Vulnerabilities

CVE-2016-4834

May 14, 2021

Summary: modules/Users/actions/Save.php in Vtiger CRM 6.4.0 and earlier does not properly restrict user-save actions, which allows remote authenticated users to...

Read MoreRead more about CVE-2016-4834
CVE-prog
  • Vulnerabilities

CVE-2021-31598

May 14, 2021

Summary: An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted...

Read MoreRead more about CVE-2021-31598
osint
  • News

WhatsApp calls and messages will break unless you share data with Facebook

May 14, 2021

WhatsApp told users last week that there was no need for alarm regarding an upcoming privacy policy deadline, as users...

Read MoreRead more about WhatsApp calls and messages will break unless you share data with Facebook
osint
  • News

What is a honeypot? How they are used in cybersecurity

May 14, 2021

Cybersecurity experts strive to enhance the security and privacy of computer systems. Quietly observing threat actors in action can help...

Read MoreRead more about What is a honeypot? How they are used in cybersecurity
png_
  • News

Newly observed PHP-based skimmer shows ongoing Magecart Group 12 activity

May 14, 2021

This blog post was authored by Jérôme Segura Web skimming continues to be a real and impactful threat to online...

Read MoreRead more about Newly observed PHP-based skimmer shows ongoing Magecart Group 12 activity
osint
  • News

What does WiFi stand for?

May 14, 2021

We use WiFi to connect to the Internet, but what is it, and what does it stand for? How does...

Read MoreRead more about What does WiFi stand for?
osint
  • News

Using iPhones and AirTags to sneak data out of air-gapped networks

May 14, 2021

Someone has found an extraordinary way to exfiltrate data by piggybacking data on the backs of unsuspecting iPhones. Say what?...

Read MoreRead more about Using iPhones and AirTags to sneak data out of air-gapped networks
hacker-4867349_1280
  • News

The White House believes that the attackers on the Colonial Pipeline are located in Russia

May 14, 2021

 The Russian authorities should take action against the hacker group DarkSide, which, according to Washington, is located in Russia and...

Read MoreRead more about The White House believes that the attackers on the Colonial Pipeline are located in Russia
sara-kurfess-B4ndBW2R_Q8-unsplash
  • News

Apple App Store Saved Users $1.5 Billion Worth in Fraud Transactions

May 14, 2021

 Tech giant Apple claimed that the measures taken to detect malicious apps and actions by developers on the App Store...

Read MoreRead more about Apple App Store Saved Users $1.5 Billion Worth in Fraud Transactions
google-chrome-1326908_1280
  • News

Fake Chrome App is Being Used as Part of a Cyberattack Campaign

May 14, 2021

 According to researchers at cybersecurity company Pradeo, a new Android malware has been discovered that imitates the Google Chrome software...

Read MoreRead more about Fake Chrome App is Being Used as Part of a Cyberattack Campaign
pexels-markus-spiske-10894382B252812529
  • News

Hackers Take Advantage of Adobe Zero-Day Vulnerability Impacting Acrobat Reader

May 14, 2021

 A patch for Adobe Acrobat, the world's most popular PDF reader, addresses a vulnerability that has been actively exploited and...

Read MoreRead more about Hackers Take Advantage of Adobe Zero-Day Vulnerability Impacting Acrobat Reader
pexels-anna-nekrashevich-6801872
  • News

167 Fake iOS & Android Trading Apps Brought to Light by Researchers

May 14, 2021

 Sophos, a worldwide leader in cybersecurity, has found 167 fake Android and iOS apps that criminals have been using to...

Read MoreRead more about 167 Fake iOS & Android Trading Apps Brought to Light by Researchers
3klCon_1_Welcome
  • Tools

3klCon – Automation Recon Tool Which Works With Large And Medium Scope

May 14, 2021

Full Automation Recon tool which works with Small and Medium scopes. ّIt's recommended to use it on VPS, it'll discover...

Read MoreRead more about 3klCon – Automation Recon Tool Which Works With Large And Medium Scope
snuffleupagus_1_sp
  • Tools

Snuffleupagus – Security Module For Php7 And Php8 – Killing Bugclasses And Virtual-Patching The Rest!

May 14, 2021

Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest! Snuffleupagus is a PHP 7+ and 8+...

Read MoreRead more about Snuffleupagus – Security Module For Php7 And Php8 – Killing Bugclasses And Virtual-Patching The Rest!

Posts pagination

Previous 1 … 3,969 3,970 3,971 3,972 3,973 3,974 3,975 … 4,209 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-7066

July 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-52807

July 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-52813

July 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-52833

July 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6740

July 5, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel