Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Damn-Vulnerable-Bank_1_screen1
  • News

Damn-Vulnerable-Bank – Vulnerable Banking Application For Android

November 28, 2020

Damn Vulnerable Bank Android Application aims to provide an interface for everyone to get a detailed understanding with internals and...

Read MoreRead more about Damn-Vulnerable-Bank – Vulnerable Banking Application For Android
osint
  • News

Cybersecurity Company Sophos Hit By Data Breach Attack, Company Informs Customers

November 27, 2020

 A data breach attack recently hit Sophos, a Uk based cybersecurity company. The company currently has notified its customers regarding...

Read MoreRead more about Cybersecurity Company Sophos Hit By Data Breach Attack, Company Informs Customers
email-3242597_960_720
  • News

Massive BEC Phishing Ring Uncovered, 3 Nigerian Nationals Arrested

November 27, 2020

 In the city of Lagos, three Nigerian nationals suspected of participation in an organized cybercrime group behind malware distribution, phishing...

Read MoreRead more about Massive BEC Phishing Ring Uncovered, 3 Nigerian Nationals Arrested
N1QLMap
  • News

N1QLMap – The Tool Exfiltrates Data From Couchbase Database By Exploiting N1QL Injection Vulnerabilities

November 27, 2020

N1QLMap is an N1QL exploitation tool. Currently works with Couchbase database. The tool supports data extraction and performing SSRF attacks...

Read MoreRead more about N1QLMap – The Tool Exfiltrates Data From Couchbase Database By Exploiting N1QL Injection Vulnerabilities
bunkerized-nginx_1_logo
  • News

Bunkerized-Nginx – Nginx Docker Image Secure By Default

November 27, 2020

nginx Docker image secure by default. Avoid the hassle of following security best practices each time you need a web...

Read MoreRead more about Bunkerized-Nginx – Nginx Docker Image Secure By Default
osint
  • News

IoT cybersecurity bill passed by Senate

November 26, 2020

Days before taking a week-long Thanksgiving recess, the US Senate passed an almost mundane cybersecurity bill that, if approved by...

Read MoreRead more about IoT cybersecurity bill passed by Senate
osint
  • News

Spotify resets some user logins after hacker database found floating online

November 26, 2020

A team of researchers working for vpnMentor has found a treasure trove in the form of an unsecured Elasticsearch database...

Read MoreRead more about Spotify resets some user logins after hacker database found floating online
pinterest-793051_1280
  • News

Pinterest soon to join the Online Classes Plethora

November 26, 2020

 With 400 Million monthly active users (a 30% increase from last year), Pinterest is gaining foot among millennials and Gen...

Read MoreRead more about Pinterest soon to join the Online Classes Plethora
minecraft2-e1606248135892
  • News

Fake Minecraft Modpacks On Google Play Deliver Millions of Abusive Ads and Disrupt Normal Phone Usage

November 26, 2020

 Scammers have now begun taking advantage of the Minecraft sandbox video clip game’s wild accomplishment by building Google Play applications.These...

Read MoreRead more about Fake Minecraft Modpacks On Google Play Deliver Millions of Abusive Ads and Disrupt Normal Phone Usage
Cobalt-Strike
  • News

RedShell – An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server

November 26, 2020

An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server.InstallationRedShell runs...

Read MoreRead more about RedShell – An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server
wsb-detect_1
  • News

Wsb-Detect – Tool To Detect If You Are Running In Windows Sandbox (“WSB”)

November 26, 2020

wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB"). The sandbox is used by Windows Defender...

Read MoreRead more about Wsb-Detect – Tool To Detect If You Are Running In Windows Sandbox (“WSB”)
Apple-request-system-extension-entitlement-600x383-1
  • News

Apple security hampers detection of unwanted programs

November 25, 2020

Anyone who uses Malwarebytes software is probably familiar with the fact that, in addition to things like malware and adware,...

Read MoreRead more about Apple security hampers detection of unwanted programs
osint
  • News

Looks like we’re stuck with Zoom: Is it any safer?

November 25, 2020

Earlier this month, Zoom’s stock price took a dive on news of two promising COVID vaccines offering over 90 percent...

Read MoreRead more about Looks like we’re stuck with Zoom: Is it any safer?
online-meeting-5183791_1280
  • News

Russian expert warned about the dangers of password theft during video conferencing

November 25, 2020

Anton Kardanov, head of the information security sector at AT Consulting, warned that motion recognition systems can be used by...

Read MoreRead more about Russian expert warned about the dangers of password theft during video conferencing
osint
  • News

Chinese State-Sponsored Hackers Exploiting Zerologon Vulnerability

November 25, 2020

 Chinese state-sponsored threat actors have been observed exploiting the Zerologon vulnerability in a global campaign targeting businesses from multiple industries...

Read MoreRead more about Chinese State-Sponsored Hackers Exploiting Zerologon Vulnerability
sl_abstract_nodes-990x400-1
  • News

Lookalike domains and how to outfox them

November 25, 2020

Our colleagues already delved into how cybercriminals attack companies through compromised email addresses of employees, and how to protect against...

Read MoreRead more about Lookalike domains and how to outfox them
uafuzz_1_logo
  • News

UAFuzz – Binary-level Directed Fuzzing For Use-After-Free Vulnerabilities

November 25, 2020

Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to...

Read MoreRead more about UAFuzz – Binary-level Directed Fuzzing For Use-After-Free Vulnerabilities
Xerror_1
  • News

Xerror – Fully Automated Pentesting Tool

November 25, 2020

Xerror is an automated penetration tool , which will helps security professionals and non professionals to automate their pentesting tasks....

Read MoreRead more about Xerror – Fully Automated Pentesting Tool
CVE-2020-7378-OpenCRX-Unverified-Password-Change
  • News

CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)

November 25, 2020

OpenCRX version 4.30 and version 5.0-20200717 suffers from an unverified password change vulnerability, which is an instance of CWE-620. This...

Read MoreRead more about CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)
osint
  • News

Lock and Code S1Ep20: Tracking the charities that track you online with Chris Boyd

November 24, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep20: Tracking the charities that track you online with Chris Boyd
osint
  • News

Interview Spotlight: Israeli Hardware Solutions, Sepio Systems

November 24, 2020

On 19 November, E-Hacking News conducted an interesting interview with Sepio Systems. The company provides its customers with the highest...

Read MoreRead more about Interview Spotlight: Israeli Hardware Solutions, Sepio Systems
toothpicker_1_toothpicker
  • News

ToothPicker – An In-Process, Coverage-Guided Fuzzer For iOS

November 24, 2020

ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically targets iOS's Bluetooth daemon bluetoothd and to...

Read MoreRead more about ToothPicker – An In-Process, Coverage-Guided Fuzzer For iOS
osi.ig_1_20191103_233944
  • News

Osi.Ig – Information Gathering Instagram

November 24, 2020

The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to...

Read MoreRead more about Osi.Ig – Information Gathering Instagram
osint
  • Vulnerabilities

SEC Consult SA-20201123-0 :: Multiple Vulnerabilities in ZTE WLAN router MF253V

November 24, 2020

Posted by SEC Consult Vulnerability Lab on Nov 23SEC Consult Vulnerability Lab Security Advisory < 20201123-0 > ======================================================================= title: Multiple...

Read MoreRead more about SEC Consult SA-20201123-0 :: Multiple Vulnerabilities in ZTE WLAN router MF253V

Posts pagination

Previous 1 … 3,971 3,972 3,973 3,974 3,975 3,976 3,977 … 4,084 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

1475645c8b44ba444d81045bf9551e068d484bfed419842d1c0d57949fe5d592
  • News

Lastos Slaps Neon Paint On Linux Mint And Dares You To Run Photoshop

May 20, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-39395

May 20, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46441

May 20, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47935

May 20, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-39402

May 20, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel