Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
IMG_1957
  • News

Databases of users of Russian ad services Avito and Yula have appeared on the network

July 26, 2020

Six files with tables in CSV format are in the public domain, which means that anyone can download them. Each...

Read MoreRead more about Databases of users of Russian ad services Avito and Yula have appeared on the network
osint
  • News

Aberystwyth University and others affected by Blackbaud Global Ransomattack

July 26, 2020

Aberystwyth University, a 148-year-old mid-Wales institution was attacked via a hack on Blackbaud, a US company that deals with education...

Read MoreRead more about Aberystwyth University and others affected by Blackbaud Global Ransomattack
Autoenum
  • News

Autoenum – Automatic Service Enumeration Script

July 26, 2020

Autoenum is a recon tool which performs automatic enumeration of services discovered. I built this to save some time during...

Read MoreRead more about Autoenum – Automatic Service Enumeration Script
AuthMatrix_1_img1
  • News

AuthMatrix – A Burp Suite Extension That Provides A Simple Way To Test Authorization

July 26, 2020

AuthMatrix is an extension to Burp Suite that provides a simple way to test authorization in web applications and web...

Read MoreRead more about AuthMatrix – A Burp Suite Extension That Provides A Simple Way To Test Authorization
airtel-logo-AEFF942276-seeklogo.com_
  • News

eSIM Swapping Fraud: Cyber Criminals Targeting Airtel Customers in Hyderabad

July 25, 2020

Hyderabad witnessed three back to back cases of cyberfraud wherein criminals targeted Airtel customers promising them eSIM connection that led...

Read MoreRead more about eSIM Swapping Fraud: Cyber Criminals Targeting Airtel Customers in Hyderabad
IMG_0817
  • News

Experts found targeted attacks by hackers from North Korea on Russia

July 25, 2020

Kaspersky Lab revealed that the well-known North Korean hacker group Lazarus has become active in Russia. The attackers attack through...

Read MoreRead more about Experts found targeted attacks by hackers from North Korea on Russia
permission-manager_1_flow
  • News

Permission Manager – A Project That Brings Sanity To Kubernetes RBAC And Users Management, Web UI FTW

July 25, 2020

Welcome to the Permission Manager!Permission Manager is an application developed by SIGHUP that enables a super-easy and user-friendly RBAC management...

Read MoreRead more about Permission Manager – A Project That Brings Sanity To Kubernetes RBAC And Users Management, Web UI FTW
Quiver
  • News

Quiver – Tool To Manage All Of Your Tools For Bug Bounty Hunting And Penetration Testing

July 24, 2020

Quiver is the tool to manage all of your tools. It's an opinionated and curated collection of commands, notes and...

Read MoreRead more about Quiver – Tool To Manage All Of Your Tools For Bug Bounty Hunting And Penetration Testing
osint
  • News

Deepfakes or not: new GAN image stirs up questions about digital fakery

July 24, 2020

Subversive deepfakes that enter the party unannounced, do their thing, then slink off into the night without anybody noticing are...

Read MoreRead more about Deepfakes or not: new GAN image stirs up questions about digital fakery
North_Korea
  • News

Discovery of a New Malware Framework and Its Linkages with a North Korean Hacker Group

July 24, 2020

The discovery of a brand new malware framework and its linkages with a North Korean hacker group has heightened the...

Read MoreRead more about Discovery of a New Malware Framework and Its Linkages with a North Korean Hacker Group
computer-1591018_960_720
  • News

Hackers Breached into Twilio’s AWS; Company Confirms the Attack

July 24, 2020

In a recent cybersecurity breach incident, Twilio acknowledges that hackers breached into the company's cloud services (unsecured) and compromised its...

Read MoreRead more about Hackers Breached into Twilio’s AWS; Company Confirms the Attack
onex_2
  • News

Onex – A Library Of Hacking Tools For Termux And Other Linux Distributions

July 24, 2020

"onex a hacking tools library." Onex is a kali linux hacking tools installer for termux and other linux distribution. It's...

Read MoreRead more about Onex – A Library Of Hacking Tools For Termux And Other Linux Distributions
Kali-Linux-Tools-Interface_5_logo
  • News

Kali-Linux-Tools-Interface – Graphical Web Interface Developed To Facilitate The Use Of Security Information Tools

July 24, 2020

A graphical interface to use information security tools by the browser. Getting StartedKali Linux Tools Interface is a graphical interface...

Read MoreRead more about Kali-Linux-Tools-Interface – Graphical Web Interface Developed To Facilitate The Use Of Security Information Tools
Path
  • News

CVE-2020-3452 Cisco ASA / Firepower Read-Only Path Traversal Vulnerability: What You Need to Know

July 24, 2020

On July 22, Cisco released a patch for a high-severity read-only patch traversal vulnerability in its Cisco Adaptive Security Appliance...

Read MoreRead more about CVE-2020-3452 Cisco ASA / Firepower Read-Only Path Traversal Vulnerability: What You Need to Know
Update
  • News

What’s New in InsightIDR: H1 2020 in Review

July 24, 2020

We’ve continued to make enhancements around our Custom Parsing Tool. Most recently, we’ve made it easier for customers to define...

Read MoreRead more about What’s New in InsightIDR: H1 2020 in Review
osint
  • News

Dacls RAT’s goals are to steal customer data and spread ransomware

July 23, 2020

The Dacls remote access trojan that is capable of attacking Windows, Linux and macOS environments has been used to distribute...

Read MoreRead more about Dacls RAT’s goals are to steal customer data and spread ransomware
osint
  • News

EncroChat system eavesdropped on by law enforcement

July 23, 2020

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security...

Read MoreRead more about EncroChat system eavesdropped on by law enforcement
IMG_1929
  • News

An IT expert at the Russian State Duma Explains Data Risks of Using VPN

July 23, 2020

"To prevent hackers from getting personal data of users, users don't need to use a VPN connection in their daily...

Read MoreRead more about An IT expert at the Russian State Duma Explains Data Risks of Using VPN
osint
  • News

Australia: TikTok Undergoing Scrutiny Over Data Security Concerns

July 23, 2020

Chinese video-sharing social networking platform, TikTok is undergoing scrutinization in Australia over data security and privacy concerns, according to the...

Read MoreRead more about Australia: TikTok Undergoing Scrutiny Over Data Security Concerns
abstractpicture9990897-990x400-1
  • News

MATA: Multi-platform targeted malware framework

July 23, 2020

As the IT and OT environment becomes more complex, adversaries are quick to adapt their attack strategy. For example, as...

Read MoreRead more about MATA: Multi-platform targeted malware framework
lazybee_5
  • News

Lazybee – Wordlist Generator Tool for Termux

July 23, 2020

Lazybee tool is a python based script from which you can generate random wordlist for brutefocre attacks. This tool has...

Read MoreRead more about Lazybee – Wordlist Generator Tool for Termux
QA
  • News

Q&A from June 2020 Customer Webcast on InsightVM Custom Policy Builder

July 23, 2020

This blog was co-authored by Naveen Bibinagar, Greg Wiseman, and Joel Kinzel.During our most recent “Seeing 20/20 with InsightVM” customer...

Read MoreRead more about Q&A from June 2020 Customer Webcast on InsightVM Custom Policy Builder
mailsecuritycheck-1
  • News

Chinese APT group targets India and Hong Kong using new variant of MgBot malware

July 22, 2020

This blog post was authored by Hossein Jazi and Jérôme Segura On July 2, we found an archive file with...

Read MoreRead more about Chinese APT group targets India and Hong Kong using new variant of MgBot malware
IMG_1920
  • News

Russian Foreign Ministry urged whole world to abandon cyber attacks on healthcare facilities during a pandemic

July 22, 2020

Against the background of the coronavirus pandemic, Moscow calls for an end to cyberattacks on healthcare facilities and critical infrastructure....

Read MoreRead more about Russian Foreign Ministry urged whole world to abandon cyber attacks on healthcare facilities during a pandemic

Posts pagination

Previous 1 … 3,995 3,996 3,997 3,998 3,999 4,000 4,001 … 4,069 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 167[.]99[.]76[.]115:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 115[.]175[.]39[.]35:443

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]36[.]228[.]26:8080

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 166[.]108[.]200[.]194:443

May 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel