Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
scripthunter_1_logo
  • News

Scripthunter – Tool To Find JavaScript Files On Websites

November 14, 2020

Scripthunter is a tool that finds javascript files for a given website. To scan Google, simply run ./scripthunter.sh https://google.com. Note...

Read MoreRead more about Scripthunter – Tool To Find JavaScript Files On Websites
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Home Chef – 8,815,692 breached accounts

November 13, 2020

In early 2020, the food delivery service Home Chef suffered a data breach which was subsequently sold online. The breach...

Read MoreRead more about Home Chef – 8,815,692 breached accounts
Chrome_86_04240_198-600x247-1
  • News

Hat trick for Google as it patches two more zero-days in Chrome

November 13, 2020

Slightly over a week ago we advised you to update your Chrome browser. That warning came only a week or...

Read MoreRead more about Hat trick for Google as it patches two more zero-days in Chrome
osint
  • News

Surviving college distance learning during the pandemic: a cybersecurity guide

November 13, 2020

Social distancing, the wearing of face masks, practicing hand hygiene, and disinfecting often-touched surfaces have become human necessities during the...

Read MoreRead more about Surviving college distance learning during the pandemic: a cybersecurity guide
pasted image 0
  • News

ADHD, what is it? and how does it affect me?

November 13, 2020

(it captures the ADHD experience well) TLDR: Life can be challenging for a person with ADHD; there are hidden struggles...

Read MoreRead more about ADHD, what is it? and how does it affect me?
hash
  • News

Here’s why a Greece Hacker Easily Hacked Croatian University?

November 13, 2020

 A hacker from Greece has published the database of the University of Rijeka in the context of Croatia supporting the...

Read MoreRead more about Here’s why a Greece Hacker Easily Hacked Croatian University?
osint
  • News

Hackers Use Bugs To Attack iOS and Android Devices; Google Doesn’t Disclose Details

November 13, 2020

 Google's cybersecurity team found a cluster of high-end vulnerabilities in iOS, Windows, Android, and Chrome earlier this week. According to...

Read MoreRead more about Hackers Use Bugs To Attack iOS and Android Devices; Google Doesn’t Disclose Details
securelist_spam_2-990x400-1
  • News

Spam and phishing in Q3 2020

November 13, 2020

Quarterly highlights Worming their way in: cybercriminal tricks of the trade These days, many companies distribute marketing newsletters via online...

Read MoreRead more about Spam and phishing in Q3 2020
osint
  • Vulnerabilities

Scope of Debian’s /home/loser is with permissions 755, default umask 002

November 13, 2020

Posted by Georgi Guninski on Nov 12On Debian /home/loser is with permissions 755, default umask 0022 (If you don't understand...

Read MoreRead more about Scope of Debian’s /home/loser is with permissions 755, default umask 002
osint
  • Vulnerabilities

Avian JVM FileOutputStream.write() Integer Overflow

November 13, 2020

Posted by Pietro Oliva via Fulldisclosure on Nov 12Vulnerability title: Avian JVM FileOutputStream.write() Integer Overflow Author: Pietro Oliva Vendor: ReadyTalk...

Read MoreRead more about Avian JVM FileOutputStream.write() Integer Overflow
FAMA_2
  • News

FAMA – Forensic Analysis For Mobile Apps

November 13, 2020

LabCIF - Forensic Analysis for Mobile AppsGetting StartedAndroid extraction and analysis framework with an integrated Autopsy Module. Dump easily user...

Read MoreRead more about FAMA – Forensic Analysis For Mobile Apps
leonidas_1_architecture
  • News

Leonidas – Automated Attack Simulation In The Cloud, Complete With Detection Use Cases

November 13, 2020

Leonidas is a framework for executing attacker actions in the cloud. It provides a YAML-based format for defining cloud attacker...

Read MoreRead more about Leonidas – Automated Attack Simulation In The Cloud, Complete With Detection Use Cases
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Animal Jam – 7,104,998 breached accounts

November 12, 2020

In October 2020, the online game for kids Animal Jam suffered a data breach which was subsequently shared through online...

Read MoreRead more about Animal Jam – 7,104,998 breached accounts
RegretLocker-quarantined
  • News

RegretLocker, new ransomware, can encrypt Windows virtual hard disks

November 12, 2020

Cybersecurity researchers discovered a new ransomware last month called RegretLocker that, despite a no-frills package, can do serious damage to...

Read MoreRead more about RegretLocker, new ransomware, can encrypt Windows virtual hard disks
wallet-3950973_960_720
  • News

Walleon Smart Wallet – where Elegance, Fashion, and Innovation meet

November 12, 2020

With everything evolving around us, technology has reached another great peak when smart wallets came to the market. Being sure,...

Read MoreRead more about Walleon Smart Wallet – where Elegance, Fashion, and Innovation meet
dd00f3d904c02459abc4e6fc2b7984cfcfc4749b
  • News

Czech Republic’s Intelligence Agency Reveal on Russian And Chinese Spies Posing an Imminent Threat to The EU Member’s Security

November 12, 2020

 The Czech Republic's intelligence agency recently revealed that Russian and Chinese spies posed an up and coming threat to the...

Read MoreRead more about Czech Republic’s Intelligence Agency Reveal on Russian And Chinese Spies Posing an Imminent Threat to The EU Member’s Security
startup-3267505_1280
  • News

Interview with Shanmugavel Sankaran, founder of FixNix – The Entrepreneur who sold his house

November 12, 2020

Shanmugavel Sankaran has previously worked with Microsoft and IBM in a variety of information security and compliance management positions. Now...

Read MoreRead more about Interview with Shanmugavel Sankaran, founder of FixNix – The Entrepreneur who sold his house
abstract-blue-digital-man-990x400-1
  • News

Targeted ransomware: it’s not just about encrypting your data!

November 12, 2020

When we talk about ransomware, we need to draw a line between what it used to be and what it...

Read MoreRead more about Targeted ransomware: it’s not just about encrypting your data!
OctopusWAF_1_octopuswaf2
  • News

Octopus WAF – Web Application Firewall Made In C Language And Use Libevent

November 12, 2020

OctopusWAF is a open source Web application firewall, is made in C language uses libevent to make multiple connections. First...

Read MoreRead more about Octopus WAF – Web Application Firewall Made In C Language And Use Libevent
nfc
  • News

NFCGate – An NFC Research Toolkit Application For Android

November 12, 2020

NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching...

Read MoreRead more about NFCGate – An NFC Research Toolkit Application For Android
2021-Detection-and-Response-Planning-Part-4-Planning-for-Success-with-a-Cloud-SIEM2
  • News

2021 Detection and Response Planning, Part 4: Planning for Success with a Cloud SIEM

November 12, 2020

This is the fourth and final installment of our series around 2021 security planning. Through this series, we talked to...

Read MoreRead more about 2021 Detection and Response Planning, Part 4: Planning for Success with a Cloud SIEM
patches-2
  • News

Patch Tuesday – November 2020

November 11, 2020

Jumping right back to a triple digit volume of vulnerabilities resolved, Microsoft covers 112 CVEs this November affecting products ranging...

Read MoreRead more about Patch Tuesday – November 2020
fantasy-door-surreal
  • News

VMware ESXi OpenSLP Remote Code Execution Vulnerability (CVE-2020-3992 and CVE-2019-5544): What You Need To Know

November 11, 2020

What’s up? On November 6, 2020 Microsoft’s Kevin Beaumont alerted the community to evidence of active exploitation attempts of CVE-2020-3992...

Read MoreRead more about VMware ESXi OpenSLP Remote Code Execution Vulnerability (CVE-2020-3992 and CVE-2019-5544): What You Need To Know
updating-600x341-1
  • News

Mozilla patches critical security issues in Firefox and Thunderbird

November 11, 2020

Mozilla has issued a critical patch for Firefox, Firefox ESR, and Thunderbird after a security issue was discovered at the...

Read MoreRead more about Mozilla patches critical security issues in Firefox and Thunderbird

Posts pagination

Previous 1 … 3,975 3,976 3,977 3,978 3,979 3,980 3,981 … 4,084 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[KILLSEC] – Ransomware Victim: Medswana

May 20, 2025
image
  • Data Breach
  • Ransomware

[IMNCREW] – Ransomware Victim: Stiga[.]com

May 20, 2025
image
  • Data Breach
  • Ransomware

[WORLDLEAKS] – Ransomware Victim: Indigo Group S[.]A[.]

May 20, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 156[.]238[.]224[.]164:80

May 20, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 111[.]229[.]0[.]18:443

May 20, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel