Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
GettyImages-953921126-e1597951075488-1024x614-1
  • News

Threat hunters watch as Chinese hackers forage forums for tools

August 21, 2020

Pictured: The Forbidden City, in Beijing. Experts say Chinese APT operations use a mix of proprietary and publicly available tools...

Read MoreRead more about Threat hunters watch as Chinese hackers forage forums for tools
osint
  • News

Apple OS developer supply chain threatened by ‘clever’ malware attack

August 21, 2020

In an attack described as a “clever” supply-chain threat, XCSSET malware is being injected undetected into programs created by unwitting...

Read MoreRead more about Apple OS developer supply chain threatened by ‘clever’ malware attack
osint
  • News

DHS and FBI warn of North Korean malware targeted at defense contractors

August 21, 2020

The Department of Homeland Security and Federal Bureau of Investigation published an alert Wednesday about malware it claims North Korea...

Read MoreRead more about DHS and FBI warn of North Korean malware targeted at defense contractors
osint
  • News

Hackers Can Now Clone Your Key Using Just a Smartphone Microphone and a Program

August 21, 2020

Earlier this year researchers at the National University of Singapore came up and published a paper enumerating how, utilizing just...

Read MoreRead more about Hackers Can Now Clone Your Key Using Just a Smartphone Microphone and a Program
IMG_2329
  • News

More than 100 websites selling air tickets in Russia turned out to be fraudulent

August 21, 2020

Cybercriminals continue to deceive people. According to the Group-IB, over the past few months, more than 100 fraudulent sites in...

Read MoreRead more about More than 100 websites selling air tickets in Russia turned out to be fraudulent
IMG_2319
  • News

Expert Malnev gave tips on detecting Keylogger

August 21, 2020

Alexey Malnev, head of the Jet CSIRT Information Security Monitoring and Incident Response Center of Jet Infosystems, spoke about how...

Read MoreRead more about Expert Malnev gave tips on detecting Keylogger
matrix-1799650_960_720
  • News

REvil/Sodinokibi Ransomware Specifically Targeting Food and Beverages Organizations

August 21, 2020

REvil, also known as Sodinokibi ransomware was first spotted in April 2019, it attacks Windows PCs to encrypt all the...

Read MoreRead more about REvil/Sodinokibi Ransomware Specifically Targeting Food and Beverages Organizations
securelist_abs_5-990x400-1
  • News

Transparent Tribe: Evolution analysis,part 1

August 21, 2020

Background and key findings Transparent Tribe, also known as PROJECTM and MYTHIC LEOPARD, is a highly prolific group whose activities...

Read MoreRead more about Transparent Tribe: Evolution analysis,part 1
wonitor_1_screenshot
  • News

Wonitor – Fast, Zero Config Web Endpoint Change Monitor

August 21, 2020

fast, zero config web endpoint change monitor. for comparing responses, a selected list of http headers and the full response...

Read MoreRead more about Wonitor – Fast, Zero Config Web Endpoint Change Monitor
dropengine_1_DropEngine2525201
  • News

DropEngine – Malleable Payloads!

August 21, 2020

By @s0lst1c3DisclaimerDropEngine (the "Software") and associated documentation is provided “AS IS”. The Developer makes no other warranties, express or implied,...

Read MoreRead more about DropEngine – Malleable Payloads!
Automated-External-Sonar-Scanning-Workflow-with-InsightVM-2
  • News

Automated External Sonar Scanning Workflow with InsightVM

August 21, 2020

Have you ever come into the office on a Monday and were completely surprised by your boss asking about some...

Read MoreRead more about Automated External Sonar Scanning Workflow with InsightVM
DevOps-200x125-1
  • News

How Unsecure gRPC Implementations Can Compromise APIs, Applications

August 20, 2020

By David Fiser (Security Researcher) Enterprises are turning to microservice architecture to build future-facing applications. Microservices allow enterprises to efficiently...

Read MoreRead more about How Unsecure gRPC Implementations Can Compromise APIs, Applications
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Unico Campania – 166,031 breached accounts

August 20, 2020

In August 2020, the Neapolitan public transport website Unico Campania was hacked and the data extensively circulated. The breach contained...

Read MoreRead more about Unico Campania – 166,031 breached accounts
osint
  • News

20 percent of organizations experienced breach due to remote worker, Labs report reveals

August 20, 2020

It is no surprise that moving to a fully remote work environment due to COVID-19 would cause a number of...

Read MoreRead more about 20 percent of organizations experienced breach due to remote worker, Labs report reveals
reconspider_1
  • News

ReconSpider – Most Advanced Open Source Intelligence (OSINT) Framework For Scanning IP Address, Emails, Websites, Organizations

August 19, 2020

ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations and find out information...

Read MoreRead more about ReconSpider – Most Advanced Open Source Intelligence (OSINT) Framework For Scanning IP Address, Emails, Websites, Organizations
shutterstock_498172096.0
  • News

US Army Says North Korea Has Hackers and Electronic Warfare Specialists Working and Operating Abroad

August 19, 2020

In a report published a month ago by the US Army said North Korea has at least 6,000 hackers and...

Read MoreRead more about US Army Says North Korea Has Hackers and Electronic Warfare Specialists Working and Operating Abroad
pagodo
  • News

Pagodo – Automate Google Hacking Database Scraping And Searching

August 19, 2020

The goal of this project was to develop a passive Google dork script to collect potentially vulnerable web pages and...

Read MoreRead more about Pagodo – Automate Google Hacking Database Scraping And Searching
osint
  • News

Bangaluru based startup Pixxel raises $5 Million to be India’s first Earth-Imaging Satellite to launch

August 19, 2020

A Bengaluru based startup, Pixxel is soaring towards the moon as they recently raised a sweeping fund of 5 million...

Read MoreRead more about Bangaluru based startup Pixxel raises $5 Million to be India’s first Earth-Imaging Satellite to launch
kali-2020-3-release-v2
  • News

Kali Linux 2020.3 Release – Penetration Testing and Ethical Hacking Linux Distribution

August 19, 2020

Time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various impressive updates.A quick overview...

Read MoreRead more about Kali Linux 2020.3 Release – Penetration Testing and Ethical Hacking Linux Distribution
Ask-a-Pen-Tester-Part-1-A-Q-A-With-Rapid7-Pen-Testers-Gisela-Hinojosa-and-Carlota-Bindner
  • News

Ask a Pen Tester, Part 1: A Q&A With Rapid7 Pen Testers Gisela Hinojosa and Carlota Bindner

August 19, 2020

Recently, we tasked some of our Rapid7 customers to ask their most burning questions related to the mysterious art of...

Read MoreRead more about <div>Ask a Pen Tester, Part 1: A Q&A With Rapid7 Pen Testers Gisela Hinojosa and Carlota Bindner</div>
GettyImages-1041475852-e1597816071722-1024x614-1
  • News

U.S. urges Linux users to secure kernels from new Russian malware threat

August 19, 2020

The FBI and NSA jointly issued an advisory on Drovorub – a newly disclosed malware program targeting Linux systems. (Jan...

Read MoreRead more about U.S. urges Linux users to secure kernels from new Russian malware threat
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Utah Gun Exchange – 235,233 breached accounts

August 19, 2020

In July 2020, the Utah Gun Exchange website suffered a data breach which included several other associated websites. In total,...

Read MoreRead more about Utah Gun Exchange – 235,233 breached accounts
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Catho – 1,173,012 breached accounts

August 19, 2020

In approximately March 2020, the Brazilian recruitment website Catho was compromised and subsequently appeared alongside 20 other breached websites listed...

Read MoreRead more about Catho – 1,173,012 breached accounts
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Sonicbids – 751,700 breached accounts

August 19, 2020

In December 2019, the booking website Sonicbids suffered a data breach which they attributed to "a data privacy event involving...

Read MoreRead more about Sonicbids – 751,700 breached accounts

Posts pagination

Previous 1 … 3,999 4,000 4,001 4,002 4,003 4,004 4,005 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[WORLDLEAKS] – Ransomware Victim: Horecamaterialen De Meester NV

May 18, 2025
image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: DSI Tech

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]8[.]233[.]224:81

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 118[.]178[.]192[.]36:8092

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 196[.]251[.]83[.]52:80

May 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel