Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
natlas_1
  • News

Natlas – Scaling Network Scanning

July 16, 2020

You've got a lot of maps and they are getting pretty unruly. What do you do? You put them in...

Read MoreRead more about Natlas – Scaling Network Scanning
Top-5-Ways-to-Get-a-Network-Traffic-Source-on-Your-Network2
  • News

Top 5 Ways to Get a Network Traffic Source on Your Network

July 16, 2020

In my last blog post, I looked at How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response....

Read MoreRead more about Top 5 Ways to Get a Network Traffic Source on Your Network
Patch-Tuesday05-200x200-1
  • News

Patch Tuesday: Fixes for ‘Wormable’ Windows DNS Server RCE, SharePoint Flaws

July 15, 2020

There has been a common vulnerabilities and exposures (CVE) fixing trend in 2020 Patch Tuesdays. For instance, Microsoft has patched...

Read MoreRead more about Patch Tuesday: Fixes for ‘Wormable’ Windows DNS Server RCE, SharePoint Flaws
patches-2
  • News

Patch Tuesday – July 2020

July 15, 2020

100+ vulnerabilities patched during Patch Tuesdays the new normAnother 123 CVEs are covered this month from Microsoft for the 2020-Jul...

Read MoreRead more about Patch Tuesday – July 2020
osint
  • News

TrickBot accidentally issues infection warning to Victims

July 15, 2020

Advanced Intel’s Vitali Kremez traced a mistake by TrickBot malware, wherein it mistakingly left warning messages on the victim's machine...

Read MoreRead more about TrickBot accidentally issues infection warning to Victims
IMG_1829
  • News

Pavel Durov called on Apple to oblige to install different application stores

July 15, 2020

Apple should allow users to install apps not only from its own App Store. This opinion was expressed by the...

Read MoreRead more about Pavel Durov called on Apple to oblige to install different application stores
maskprocessor
  • News

Maskprocessor – High-Performance Word Generator With A Per-Position Configureable Charset

July 15, 2020

High-Performance word generator with a per-position configureable charsetMask attackTry all combinations from a given keyspace just like in Brute-Force attack,...

Read MoreRead more about Maskprocessor – High-Performance Word Generator With A Per-Position Configureable Charset
Windows
  • News

Windows DNS Server Remote Code Execution Vulnerability (CVE-2020-1350): What You Need to Know

July 15, 2020

On Tuesday, July 14, 2020, Microsoft released a patch for a 17-year-old remote code execution (RCE) vulnerability in Windows Domain...

Read MoreRead more about Windows DNS Server Remote Code Execution Vulnerability (CVE-2020-1350): What You Need to Know
SAP
  • News

CVE-2020-6287: Critical Vulnerability in SAP NetWeaver Application Server (AS) Java

July 15, 2020

This blog post was co-authored by Scott King, Brian Carey, and Justin Berry.Overview of business impact and implications of CVE-2020-6287This...

Read MoreRead more about CVE-2020-6287: Critical Vulnerability in SAP NetWeaver Application Server (AS) Java
osint
  • News

SIGRed – CVE-2020-1350 – Wormable DNS

July 14, 2020

SIGRed (CVE-2020-1350) is a wormable, critical vulnerability (CVSS base score of 10.0) in the Windows DNS server that affects Windows...

Read MoreRead more about SIGRed – CVE-2020-1350 – Wormable DNS
osint
  • News

Stalkerware advertising ban by Google a welcome, if incomplete, step

July 14, 2020

On Friday, July 10, Google announced it would no longer allow advertising for spyware and similar surveillance technology—often referred to...

Read MoreRead more about Stalkerware advertising ban by Google a welcome, if incomplete, step
x64dbg_14
  • News

X64Dbg – An Open-Source X64/X32 Debugger For Windows

July 14, 2020

An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the...

Read MoreRead more about X64Dbg – An Open-Source X64/X32 Debugger For Windows
Unlocking-the-Power-of-Macro-Authentication-in-Application-Security-Part-Three
  • News

Unlocking the Power of Macro Authentication in Application Security: Part Three

July 14, 2020

This blog post is part three of our three-part series on macro authentication. Be sure to catch up on part...

Read MoreRead more about Unlocking the Power of Macro Authentication in Application Security: Part Three
abstract-money-990x400-1
  • News

The Tetrade: Brazilian banking malware goes global

July 14, 2020

Introduction Brazil is a well-known country with plenty of banking trojans developed by local crooks. The Brazilian criminal underground is...

Read MoreRead more about The Tetrade: Brazilian banking malware goes global
  • Smart Home

5 Best Smart Home Hubs 2020

July 14, 2020

What once seemed like science fiction is now a reality: we are building smart homes. However, the more smart devices...

Read MoreRead more about 5 Best Smart Home Hubs 2020
osint
  • News

More Chinese tax software found to dish out backdoor malware

July 14, 2020

A second tax software program associated with the Chinese banking industry has now been found to contain an embedded backdoor...

Read MoreRead more about More Chinese tax software found to dish out backdoor malware
osint
  • News

A week in security (July 6 – 12)

July 14, 2020

Last week on Malwarebytes Labs, we took an in-depth look at card skimmers targeting ASP sites, we released another episode...

Read MoreRead more about A week in security (July 6 – 12)
IMG_1816
  • News

Telegraph service was unblocked in Russia

July 14, 2020

Russia stopped blocking the popular Telegram messenger almost a month ago. However, the related Telegraph service continued to be blocked....

Read MoreRead more about Telegraph service was unblocked in Russia
osint
  • News

Zoom Zero-Day Allowed Remote Code Execution, Patch Issued

July 14, 2020

Video and audio conferencing software, Zoom patched a zero-day vulnerability that was affecting users running old versions of Windows: Windows...

Read MoreRead more about Zoom Zero-Day Allowed Remote Code Execution, Patch Issued
143501-tr
  • News

Trojans, Backdoors and Droppers the Top Three Malware Globally?

July 14, 2020

According to a few recent surveys and analysis conducted by some well-known and influential cybersecurity agencies, there are approximately 3...

Read MoreRead more about Trojans, Backdoors and Droppers the Top Three Malware Globally?
osint
  • News

How Content Abuse is giving rise to online Frauds, explains SIFT

July 14, 2020

A report from Sift on 'Content Abuse and the Fraud Economy' explores the rising arena of online frauds and content...

Read MoreRead more about How Content Abuse is giving rise to online Frauds, explains SIFT
dronesploit_8
  • News

DroneSploit – Drone Pentesting Framework Console

July 14, 2020

This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on...

Read MoreRead more about DroneSploit – Drone Pentesting Framework Console
padding-oracle-attacker_1_poattack-decrypt
  • News

Padding-Oracle-Attacker – CLI Tool And Library To Execute Padding Oracle Attacks Easily

July 14, 2020

CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.InstallMake...

Read MoreRead more about Padding-Oracle-Attacker – CLI Tool And Library To Execute Padding Oracle Attacks Easily
Citizen-Science-and-Medical-Consumerism-Confronting-the-Tech-Wisdom-Gap-in-Modern-Healthcare
  • News

Citizen Science and Medical Consumerism: Confronting the Tech Wisdom Gap in Modern Healthcare

July 14, 2020

In our latest episode of Security Nation, we spoke with Nina Alli, executive director of the Biohacking Village, to discuss...

Read MoreRead more about Citizen Science and Medical Consumerism: Confronting the Tech Wisdom Gap in Modern Healthcare

Posts pagination

Previous 1 … 3,997 3,998 3,999 4,000 4,001 4,002 4,003 … 4,068 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-4472

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4469

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4468

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3455

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4470

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel