Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Secure Coding Practices to Protect Your Software

June 27, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for Robust Cyber Defense

June 25, 2025
unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

CVE-2021-29069

March 26, 2021

Summary: Certain NETGEAR devices are affected by command injection by an authenticated user. This affects XR450 before 2.3.2.114, XR500 before...

Read MoreRead more about CVE-2021-29069
CVE-prog
  • Vulnerabilities

CVE-2020-10648

March 26, 2021

Summary: Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a...

Read MoreRead more about CVE-2020-10648
CVE-prog
  • Vulnerabilities

CVE-2020-27874

March 26, 2021

Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is...

Read MoreRead more about CVE-2020-27874
osint
  • News

Perkiler malware turns to SMB brute force to spread

March 26, 2021

Researchers at Guardicore have identified a new infection vector being used by the Perkiler malware where internet-facing Windows machines are...

Read MoreRead more about Perkiler malware turns to SMB brute force to spread
osint
  • News

Slack hurries to fix direct message flaw that allowed harassment

March 26, 2021

The enormous work messaging platform Slack quickly reversed course yesterday, promising to revise a brand-new direct message feature that could...

Read MoreRead more about Slack hurries to fix direct message flaw that allowed harassment
self-knowledge-2817857_1280
  • News

Anonymous Hackers reportedly exposed the anti-Russian activities of the British Council

March 26, 2021

The Anonymous hacker group published an analysis of documents belonging to various British government agencies, including the Foreign Office, according...

Read MoreRead more about Anonymous Hackers reportedly exposed the anti-Russian activities of the British Council
shahadat-rahman-BfrQnKBulYQ-unsplash-2
  • News

Personal Details of 6.5 Million Israeli Voters Leaked Online

March 26, 2021

 A database with the names and ID numbers of all the eligible voters in Israel was leaked online by anonymous...

Read MoreRead more about Personal Details of 6.5 Million Israeli Voters Leaked Online
warning-2168379_1280
  • News

New Worm Capabilities Targets Windows Machines

March 26, 2021

 A malware that has verifiably targeted exposed Windows machines through phishing and exploit kits have been retooled to add new...

Read MoreRead more about New Worm Capabilities Targets Windows Machines
macbook-3777665_1920
  • News

Data From These Two Universities Stolen and Published Online by Clop Ransomware Group

March 26, 2021

 The Clop ransomware group has officially published online the grades and social security numbers for students at the University of...

Read MoreRead more about Data From These Two Universities Stolen and Published Online by Clop Ransomware Group
sl_abstract_ics_industrial-990x400-1
  • News

Threat landscape for industrial automation systems. Statistics for H2 2020

March 26, 2021

Figures Indicator H1 2020 H2 2020 2020 Global percentage of attacked ICS computers 32.6% 33.42% 38.55% Percentage of attacked ICS...

Read MoreRead more about Threat landscape for industrial automation systems. Statistics for H2 2020
cloud_aws
  • Tools

Smogcloud – Find Cloud Assets That No One Wants Exposed

March 26, 2021

Find exposed AWS cloud assets that you did not know you had. A comprehensive asset inventory is step one to...

Read MoreRead more about Smogcloud – Find Cloud Assets That No One Wants Exposed
gitrecon_1
  • Tools

Gitrecon – OSINT Tool To Get Information From A Github Profile And Find GitHub User’S Email Addresses Leaked On Commits

March 26, 2021

OSINT tool to get information from a github profile and find GitHub user's email addresses leaked on commits.How does this...

Read MoreRead more about Gitrecon – OSINT Tool To Get Information From A Github Profile And Find GitHub User’S Email Addresses Leaked On Commits
Hunting
  • News

Attack vs. Data: What You Need to Know About Threat Hunting

March 26, 2021

Mitigate threats by going on the offensiveWhile the definition of threat hunting may be straightforward—proactively hunting for threats—the reality of...

Read MoreRead more about Attack vs. Data: What You Need to Know About Threat Hunting
osint
  • News

The surge of fake COVID-19 test results, vaccines and vaccination certificates on the Dark Web

March 25, 2021

Threat actors are offering fake COVID-19 test results and vaccination certificates in blackmarkets and hacking forums on the Dark Web....

Read MoreRead more about The surge of fake COVID-19 test results, vaccines and vaccination certificates on the Dark Web
osint
  • News

30 million Americans affected by the Astoria Company data breach

March 25, 2021

Researchers discovered the availability in the DarK Web of 30M of records of Americans affected by the Astoria Company data...

Read MoreRead more about 30 million Americans affected by the Astoria Company data breach
osint
  • News

Cisco Jabber for Windows, macOS, Android and iOS is affected by a critical issue

March 25, 2021

Cisco has addressed a critical arbitrary program execution flaw in its Cisco Jabber client software for Windows, macOS, Android, and...

Read MoreRead more about Cisco Jabber for Windows, macOS, Android and iOS is affected by a critical issue
CVE-prog
  • Vulnerabilities

CVE-2021-27587

March 25, 2021

Summary: When a user opens manipulated Jupiter Tessellation (.JT) format files received from untrusted sources in SAP 3D Visual Enterprise...

Read MoreRead more about CVE-2021-27587
CVE-prog
  • Vulnerabilities

CVE-2021-27586

March 25, 2021

Summary: When a user opens manipulated Interchange File Format (.IFF) format files received from untrusted sources in SAP 3D Visual...

Read MoreRead more about CVE-2021-27586
CVE-prog
  • Vulnerabilities

CVE-2021-28089

March 25, 2021

Summary: Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target,...

Read MoreRead more about CVE-2021-28089
CVE-prog
  • Vulnerabilities

CVE-2020-11309

March 25, 2021

Summary: Use after free in GPU driver while mapping the user memory to GPU memory due to improper check of...

Read MoreRead more about CVE-2020-11309
CVE-prog
  • Vulnerabilities

CVE-2021-21349

March 25, 2021

Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...

Read MoreRead more about CVE-2021-21349
scam_email
  • News

Software renewal scammers unmasked

March 25, 2021

We’ve been tracking a fraudulent scheme involving renewal notifications for several months now. It came to our attention because the...

Read MoreRead more about Software renewal scammers unmasked
pietro-jeng-n6B49lTx7NM-unsplash-4
  • News

GitHub Awards $25,000 Bug Bounty to the Google Employee

March 25, 2021

 GitHub awarded $25,000 to the security researcher, Teddy Katz for discovering a bug and patching it. On March 17, bug...

Read MoreRead more about GitHub Awards $25,000 Bug Bounty to the Google Employee
iphone-410324_1280
  • News

Russia’s Central Bank has warned of hackers targeting banks’ mobile apps

March 25, 2021

 The Central Bank of Russia has warned of the emergence of a group of hackers investigating vulnerabilities in banks' mobile...

Read MoreRead more about Russia’s Central Bank has warned of hackers targeting banks’ mobile apps

Posts pagination

Previous 1 … 3,997 3,998 3,999 4,000 4,001 4,002 4,003 … 4,189 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2023-29113

June 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2023-28910

June 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6818

June 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2023-28911

June 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2023-28912

June 29, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel