Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
warning1_PopStop
  • News

Chrome extensions that lie about their permissions

August 14, 2020

“But I checked the permissions before I installed this pop-up-blocker—it said nothing about changing my searches,” my dad retorts after...

Read MoreRead more about Chrome extensions that lie about their permissions
IMG_2248
  • News

Number of Cyber Attacks from Germany Increased, says Russian Foreign Minister

August 14, 2020

In the period from 2019 to 2020, Russia registered a sufficient number of cyberattacks from Germany to Russian facilities and...

Read MoreRead more about Number of Cyber Attacks from Germany Increased, says Russian Foreign Minister
osint
  • News

Facebook using AI to track hate speech

August 14, 2020

 Facebook's hate speech and malicious content identifying AI seem to be working as the company said that their AI identified...

Read MoreRead more about Facebook using AI to track hate speech
exchange_article_020
  • News

A Provider of Cyber Security Training Loses 28,000 Items of Personally Identifiable Information (PII) In a Data Breach

August 14, 2020

A provider of cybersecurity training and certification services, 'The Sans Institute', lost roughly 28,000 items of personally identifiable information (PII)...

Read MoreRead more about A Provider of Cyber Security Training Loses 28,000 Items of Personally Identifiable Information (PII) In a Data Breach
osint
  • News

Twitter Rolled-out its Latest Feature that Lets Users Limit Reply

August 14, 2020

In an attempt to make conversations more effective and meaningful, Twitter has rolled out a new feature that will allow...

Read MoreRead more about Twitter Rolled-out its Latest Feature that Lets Users Limit Reply
abstract-polygon-990x400-1
  • News

CactusPete APT group’s updated Bisonal backdoor

August 14, 2020

CactusPete (also known as Karma Panda or Tonto Team) is an APT group that has been publicly known since at...

Read MoreRead more about CactusPete APT group’s updated Bisonal backdoor
aws
  • News

AWS Report – A Tool For Analyzing Amazon Resources

August 14, 2020

AWS Report is a tool for analyzing amazon resources.Install using PIPpip install awsreportFeaturesSearch IAM users based on creation dateSearch buckets...

Read MoreRead more about AWS Report – A Tool For Analyzing Amazon Resources
Bastillion_2
  • News

Bastillion – A Web-Based SSH Console That Centrally Manages Administrative Access To Systems

August 14, 2020

Bastillion is a web-based SSH console that centrally manages administrative access to systems. Web-based administration is combined with management and...

Read MoreRead more about Bastillion – A Web-Based SSH Console That Centrally Manages Administrative Access To Systems
osint
  • News

Shadow Code in security’s blind spot, ups risk of attack

August 13, 2020

The proliferation of Shadow Code – third-party scripts and open source libraries used in web applications – may help organizations...

Read MoreRead more about Shadow Code in security’s blind spot, ups risk of attack
osint
  • News

Tesla RAT adapts, evolves to thwart security

August 13, 2020

It may be unsophisticated but the Agent Tesla RAT is “street-wise,” adapting and evolving just enough to wreak havoc on...

Read MoreRead more about Tesla RAT adapts, evolves to thwart security
link_example
  • News

Dutch ISP Ziggo demonstrates how not to inform your customers about a security flaw

August 13, 2020

“Can you have a look at this email I got, please?” my brother asked. “It looks convincing enough, but I...

Read MoreRead more about Dutch ISP Ziggo demonstrates how not to inform your customers about a security flaw
IMG_2245
  • News

About 84% of Russian companies have vulnerable IT system

August 13, 2020

More than 80% of companies in Russia neglect the basic means of protecting information systems and data, as a result...

Read MoreRead more about About 84% of Russian companies have vulnerable IT system
computer-1591018_960_720
  • News

A City In Colorado Attacked, Forced to Pay $45,000 Ransom

August 13, 2020

Lafayette city from Colorado had to pay a ransom amount worth $45,000 for decryption of files that were encrypted in...

Read MoreRead more about A City In Colorado Attacked, Forced to Pay $45,000 Ransom
nautilus_2_tree
  • News

Nautilus – A Grammar Based Feedback Fuzzer

August 13, 2020

Nautilus is a coverage guided, grammar based fuzzer. You can use it to improve your test coverage and find more...

Read MoreRead more about Nautilus – A Grammar Based Feedback Fuzzer
SharpChromium_1_cookies
  • News

SharpChromium – .NET 4.0 CLR Project To Retrieve Chromium Data, Such As Cookies, History And Saved Logins

August 13, 2020

SharpChromium is a .NET 4.0+ CLR project to retrieve data from Google Chrome, Microsoft Edge, and Microsoft Edge Beta. Currently,...

Read MoreRead more about SharpChromium – .NET 4.0 CLR Project To Retrieve Chromium Data, Such As Cookies, History And Saved Logins
patches-2
  • News

Patch Tuesday – August 2020

August 12, 2020

120 Vulnerabilities Patched in Microsoft's August 2020 Update Tuesday (2020-Aug Patch Tuesday)August 2020 brings along patches for 120 vulnerabilities within...

Read MoreRead more about Patch Tuesday – August 2020
osint
  • News

The skinny on the Instacart breach

August 12, 2020

The COVID-19 outbreak has affected many facets of our lives—from how we visit our families, socialize with friends, meet with...

Read MoreRead more about The skinny on the Instacart breach
IMG_2243
  • News

The Russian Federation leads in the number of users monitored via smartphones

August 12, 2020

In the first six months of 2020, the number of gadgets with Stalker software in Russia increased by 28% compared...

Read MoreRead more about The Russian Federation leads in the number of users monitored via smartphones
hacking-1
  • News

The United Nations Reports Increase in Internet Usage and Cyber Crime during the Pandemic

August 12, 2020

 The U.N. counterterrorism chief reported a 350% increase in phishing websites in just the first quarter of the year, mostly...

Read MoreRead more about The United Nations Reports Increase in Internet Usage and Cyber Crime during the Pandemic
IMG_2240
  • News

Security Experts gave tips on how to protect online conferences from hackers

August 12, 2020

Video conferencing services attracted the attention of hackers because they gained huge popularity during the coronavirus pandemic. On Thursday, attackers disrupted...

Read MoreRead more about Security Experts gave tips on how to protect online conferences from hackers
abstract-binary-990x400-1
  • News

Internet Explorer and Windows zero-day exploits used in Operation PowerFall

August 12, 2020

Executive summary In May 2020, Kaspersky technologies prevented an attack on a South Korean company by a malicious script for...

Read MoreRead more about Internet Explorer and Windows zero-day exploits used in Operation PowerFall
SkyArk_1_SkyArkLogo2
  • News

SkyArk – Helps To Discover, Assess And Secure The Most Privileged Entities In Azure And AWS

August 12, 2020

3. SkyArk includes more small sub-modules for playing around in the cloud security fieldAn example for such a sub-module is...

Read MoreRead more about SkyArk – Helps To Discover, Assess And Secure The Most Privileged Entities In Azure And AWS
pe_tree_1_pe_tree
  • News

PE Tree – Python Module For Viewing Portable Executable (PE) Files In A Tree-View

August 12, 2020

Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with...

Read MoreRead more about PE Tree – Python Module For Viewing Portable Executable (PE) Files In A Tree-View
wave-hero-bg
  • News

Rapid7 Named a Leader in the 2020 Forrester Wave™ for Midsize Managed Security Services Providers, Q3 2020

August 12, 2020

Rapid7 is thrilled to be named a Leader in The Forrester Wave™: Midsize Managed Security Services Providers, Q3 2020! The...

Read MoreRead more about Rapid7 Named a Leader in the 2020 Forrester Wave™ for Midsize Managed Security Services Providers, Q3 2020

Posts pagination

Previous 1 … 3,990 3,991 3,992 3,993 3,994 3,995 3,996 … 4,069 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 167[.]99[.]76[.]115:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 115[.]175[.]39[.]35:443

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]36[.]228[.]26:8080

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 166[.]108[.]200[.]194:443

May 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel