Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
h115
  • News

Yeti – Your Everyday Threat Intelligence

August 25, 2020

Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified...

Read MoreRead more about Yeti – Your Everyday Threat Intelligence
Parth_4
  • News

Parth – Heuristic Vulnerable Parameter Scanner

August 25, 2020

Some HTTP parameter names are more commonly associated with one functionality than the others. For example, the parameter ?url= usually...

Read MoreRead more about Parth – Heuristic Vulnerable Parameter Scanner
r7-rotato-program
  • News

Life as a Rapid7 Rotato: Launch Your Career

August 25, 2020

At Rapid7, we believe that by hiring a team with a strong diversity of mindset, different levels of experience, and...

Read MoreRead more about Life as a Rapid7 Rotato: Launch Your Career
cyber-security-3360776_960_720
  • News

Here’s how to Ensure Data Security Using FShred App

August 24, 2020

Users are well aware of the fact that while deleting photos, videos, files, or any other form of data on...

Read MoreRead more about Here’s how to Ensure Data Security Using FShred App
960x0
  • News

Uber’s Former Chief Security Officer Charged for Covering up A Massive Data Breach

August 24, 2020

Uber's former chief security officer, Joe Sullivan, was very recently charged by the federal prosecutors in the United States for...

Read MoreRead more about Uber’s Former Chief Security Officer Charged for Covering up A Massive Data Breach
pyre-check_1_logo
  • News

Pyre-Check – Performant Type-Checking For Python

August 24, 2020

Pyre is a performant type checker for Python compliant with PEP 484. Pyre can analyze codebases with millions of lines...

Read MoreRead more about Pyre-Check – Performant Type-Checking For Python
IntelOwl_1_intel_owl
  • News

Intel Owl – Analyze Files, Domains, IPs In Multiple Ways From A Single API At Scale

August 24, 2020

Do you want to get threat intelligence data about a file, an IP or a domain?Do you want to get...

Read MoreRead more about Intel Owl – Analyze Files, Domains, IPs In Multiple Ways From A Single API At Scale
IMG_2351
  • News

Russian media reported on fake domains for pre-ordering coronavirus vaccine

August 23, 2020

After the Russian Ministry of Health registered the first coronavirus vaccine, the number of new domains associated with the vaccine...

Read MoreRead more about Russian media reported on fake domains for pre-ordering coronavirus vaccine
349819
  • News

Scan-For-Webcams – Scan For Webcams In The Internet

August 23, 2020

Automatically scan for publically accessible webcams around the internetUsage python MJPG.py : for public MJPG streamers around the internet python...

Read MoreRead more about Scan-For-Webcams – Scan For Webcams In The Internet
cloud-sniper_1_logo
  • News

Cloud-Sniper – Virtual Security Operations Center

August 23, 2020

Cloud Security OperationsWhat is Cloud Sniper?Cloud Sniper is a platform designed to manage Security Operations in cloud environments. It is...

Read MoreRead more about Cloud-Sniper – Virtual Security Operations Center
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

LiveAuctioneers – 3,385,862 breached accounts

August 22, 2020

In June 2020, the online antiques marketplace LiveAuctioneers suffered a data breach which was subsequently sold online then extensively redistributed...

Read MoreRead more about LiveAuctioneers – 3,385,862 breached accounts
osint
  • News

‘Just tell me how to fix my computer:’ a crash course on malware detection

August 22, 2020

Malware. You’ve heard the term before, and you know it’s bad for your computer—like a computer virus. Which begs the...

Read MoreRead more about ‘Just tell me how to fix my computer:’ a crash course on malware detection
SecGen_1_secgen_default_scenario_run
  • News

SecGen – Create Randomly Insecure VMs

August 22, 2020

SecGen creates vulnerable virtual machines, lab environments, and hacking challenges, so students can learn security penetration testing techniques.Boxes like Metasploitable2...

Read MoreRead more about SecGen – Create Randomly Insecure VMs
adbsploit_1_adbsploit
  • News

ADBSploit – A Python Based Tool For Exploiting And Managing Android Devices Via ADB

August 22, 2020

A python based tool for exploiting and managing Android devices via ADBCurrently on developmentScreenrecordStream ScreenrecordExtract ContactsExtract SMSExtract Messasing App Chats...

Read MoreRead more about ADBSploit – A Python Based Tool For Exploiting And Managing Android Devices Via ADB
osint
  • Vulnerabilities

Open-Xchange Security Advisory 2020-08-20

August 21, 2020

Posted by Open-Xchange GmbH via Fulldisclosure on Aug 21Dear subscribers, we're sharing our latest advisory with you and like to...

Read MoreRead more about Open-Xchange Security Advisory 2020-08-20
osint
  • Vulnerabilities

Payment bypass in WordPress – WooCommerce – NAB Transact plugin disclosure

August 21, 2020

Posted by Jack Misiura via Fulldisclosure on Aug 21Title: Payment bypass Product: WordPress NAB Transact WooCommerce Plugin Vendor Homepage: https://woocommerce.com/products/nab-transact-direct-post/...

Read MoreRead more about Payment bypass in WordPress – WooCommerce – NAB Transact plugin disclosure
GettyImages-953921126-e1597951075488-1024x614-1
  • News

Threat hunters watch as Chinese hackers forage forums for tools

August 21, 2020

Pictured: The Forbidden City, in Beijing. Experts say Chinese APT operations use a mix of proprietary and publicly available tools...

Read MoreRead more about Threat hunters watch as Chinese hackers forage forums for tools
osint
  • News

Apple OS developer supply chain threatened by ‘clever’ malware attack

August 21, 2020

In an attack described as a “clever” supply-chain threat, XCSSET malware is being injected undetected into programs created by unwitting...

Read MoreRead more about Apple OS developer supply chain threatened by ‘clever’ malware attack
osint
  • News

DHS and FBI warn of North Korean malware targeted at defense contractors

August 21, 2020

The Department of Homeland Security and Federal Bureau of Investigation published an alert Wednesday about malware it claims North Korea...

Read MoreRead more about DHS and FBI warn of North Korean malware targeted at defense contractors
osint
  • News

Hackers Can Now Clone Your Key Using Just a Smartphone Microphone and a Program

August 21, 2020

Earlier this year researchers at the National University of Singapore came up and published a paper enumerating how, utilizing just...

Read MoreRead more about Hackers Can Now Clone Your Key Using Just a Smartphone Microphone and a Program
IMG_2329
  • News

More than 100 websites selling air tickets in Russia turned out to be fraudulent

August 21, 2020

Cybercriminals continue to deceive people. According to the Group-IB, over the past few months, more than 100 fraudulent sites in...

Read MoreRead more about More than 100 websites selling air tickets in Russia turned out to be fraudulent
IMG_2319
  • News

Expert Malnev gave tips on detecting Keylogger

August 21, 2020

Alexey Malnev, head of the Jet CSIRT Information Security Monitoring and Incident Response Center of Jet Infosystems, spoke about how...

Read MoreRead more about Expert Malnev gave tips on detecting Keylogger
matrix-1799650_960_720
  • News

REvil/Sodinokibi Ransomware Specifically Targeting Food and Beverages Organizations

August 21, 2020

REvil, also known as Sodinokibi ransomware was first spotted in April 2019, it attacks Windows PCs to encrypt all the...

Read MoreRead more about REvil/Sodinokibi Ransomware Specifically Targeting Food and Beverages Organizations
securelist_abs_5-990x400-1
  • News

Transparent Tribe: Evolution analysis,part 1

August 21, 2020

Background and key findings Transparent Tribe, also known as PROJECTM and MYTHIC LEOPARD, is a highly prolific group whose activities...

Read MoreRead more about Transparent Tribe: Evolution analysis,part 1

Posts pagination

Previous 1 … 3,987 3,988 3,989 3,990 3,991 3,992 3,993 … 4,069 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 167[.]99[.]76[.]115:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 115[.]175[.]39[.]35:443

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]36[.]228[.]26:8080

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 166[.]108[.]200[.]194:443

May 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel