Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
iox
  • News

Iox – Tool For Port Forward &Amp; Intranet Proxy

June 21, 2020

Tool for port forward & intranet proxy, just like lcx/ew, but betterWhy write?lcx and ew are awesome, but can be...

Read MoreRead more about Iox – Tool For Port Forward &Amp; Intranet Proxy
960x0
  • News

SMS System Now A Long-Gone Era; Google Brings Out A New Update

June 20, 2020

With the rise of encrypted alternatives of SMS messages, WhatsApp, iMessage, and Signal, the SMS system has become a 'throwback...

Read MoreRead more about SMS System Now A Long-Gone Era; Google Brings Out A New Update
IMG_1378
  • News

Medvedev: law enforcement agencies will need new technologies for detecting cybercrime

June 20, 2020

According to the Deputy head of the Russian Security Council, the Internet is becoming more open, and this makes it...

Read MoreRead more about Medvedev: law enforcement agencies will need new technologies for detecting cybercrime
matrix-5028024_960_720
  • News

Secondary Infektion: A Russian Disinformation Operation Agency You Need to Know About

June 20, 2020

The secret campaign was famous as "Secondary Infektion," and it worked separately from the IRA and GRU, staying hidden for...

Read MoreRead more about Secondary Infektion: A Russian Disinformation Operation Agency You Need to Know About
abstract-digital-990x400-1
  • News

Microcin is here

June 20, 2020

In February 2020, we observed a Trojan injected into the system process memory on a particular host. The target turned...

Read MoreRead more about Microcin is here
oss-fuzz_1_process
  • News

OSS-Fuzz – Continuous Fuzzing Of Open Source Software

June 20, 2020

Fuzz testing is a well-known technique for uncovering programming errors in software. Many of these detectable errors, like buffer overflow,...

Read MoreRead more about OSS-Fuzz – Continuous Fuzzing Of Open Source Software
vhosts-sieve
  • News

Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains

June 20, 2020

Searching for virtual hosts among non-resolvable domains.Installationgit clone https://github.com/dariusztytko/vhosts-sieve.gitpip3 install -r vhosts-sieve/requirements.txtUsageGet a list of subdomains (e.g. using Amass)$ amass...

Read MoreRead more about Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains
osint
  • News

Malicious Google extensions research points out ‘unintended consequence’ of cloud computing

June 19, 2020

Researchers at Awake Security have made news over the past 24 hours exposing a scheme in which some 79 malicious...

Read MoreRead more about Malicious Google extensions research points out ‘unintended consequence’ of cloud computing
osint
  • News

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

June 19, 2020

“Two can play at this game…” Cybersecurity is a non-stop arms race between white hats and malicious hackers, and the...

Read MoreRead more about Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?
osint
  • News

Facial recognition: tech giants take a step back

June 19, 2020

Last week, a few major tech companies informed the public that they will not provide facial recognition software to law...

Read MoreRead more about Facial recognition: tech giants take a step back
osint
  • News

Hackers can now spy your conversations via a simple house bulb

June 19, 2020

What if hackers can spy and record your conversation without a digital device? What if your conversations could be retrieved...

Read MoreRead more about Hackers can now spy your conversations via a simple house bulb
formphish_1
  • News

Formphish – Auto Phishing Form-Based Websites

June 19, 2020

Auto Phishing form-based websites. This tool can automatically detect inputs on html form-based websites to create a phishing page.Features:Auto detect...

Read MoreRead more about Formphish – Auto Phishing Form-Based Websites
sgn_6_usage
  • News

SGN – Encoder Ported Into Go With Several Improvements

June 19, 2020

SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a...

Read MoreRead more about SGN – Encoder Ported Into Go With Several Improvements
How-Rapid7-Customers-Are-Using-Network-Traffic-Analysis-in-Detection-and-Response-2
  • News

How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response

June 19, 2020

In case you missed it, we introduced Network Traffic Analysis for our InsightIDR and MDR customers a few months back....

Read MoreRead more about How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response
osint
  • News

Cyber snoops targeted aerospace, defense employees with fake job offers on LinkedIn

June 18, 2020

A cyber espionage operation used fake job offers, sent via LinkedIn messages, to target employees at aerospace and military companies...

Read MoreRead more about Cyber snoops targeted aerospace, defense employees with fake job offers on LinkedIn
resume
  • News

Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature

June 18, 2020

This blog post was authored by Hossein Jazi and Jérôme Segura On June 10, we found a malicious Word document...

Read MoreRead more about Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature
osint
  • News

End of line: supporting IoT in the home

June 18, 2020

Trouble is potentially brewing in Internet of Things (IoT) land, even if the consequences may still be a little way...

Read MoreRead more about End of line: supporting IoT in the home
IMG_1363
  • News

The Russian quality system (Roskachestvo) spoke about the vulnerabilities of “smart” homes

June 18, 2020

According to Roskachestvo, the Internet of things devices can violate the physical and information security of the owner if hackers...

Read MoreRead more about The Russian quality system (Roskachestvo) spoke about the vulnerabilities of “smart” homes
osint
  • News

All You Need to Know About the Recent DDoS Attacks and Threats that have Surfaced in the U.S

June 18, 2020

Cybersecurity experts have denied incidents of any DDoS s attacks in recent times. However, the attacks on T-Mobile's services that...

Read MoreRead more about All You Need to Know About the Recent DDoS Attacks and Threats that have Surfaced in the U.S
IMG_1360
  • News

Devicelock: data from 115 thousand Russians was put up for sale on the Web

June 18, 2020

A database with the data of Russians stuck abroad because of the coronavirus and returning to their homeland was put...

Read MoreRead more about Devicelock: data from 115 thousand Russians was put up for sale on the Web
osint
  • News

Know ways to avoid credit or debit card frauds

June 18, 2020

Since 2016, when India decided to go cashless the growth of online payments increased exponentially but not without risks. Online...

Read MoreRead more about Know ways to avoid credit or debit card frauds
blockchain-3750157_1280
  • News

Apple’s APSDaemon Vulnerability Abused by Malware Distributors

June 18, 2020

Attackers can maliciously redirect users on websites sharing counterfeit products, adult content or videos and dupe them into installing malware...

Read MoreRead more about Apple’s APSDaemon Vulnerability Abused by Malware Distributors
securelist_wasd_game-990x400-1
  • News

Do cybercriminals play cyber games during quarantine?

June 18, 2020

Thanks to the coronavirus pandemic, the role of the Internet in our lives has undergone changes, including irreversible ones. Some...

Read MoreRead more about Do cybercriminals play cyber games during quarantine?
TeaBreak_1_Tea252520Break
  • News

TeaBreak – A Productivity Burp Extension Which Reminds To Take Break While You Are At Work!

June 18, 2020

TeaBreak is a simple burp extension for security researchers and bug bounty hunters for helping them to increase their work...

Read MoreRead more about TeaBreak – A Productivity Burp Extension Which Reminds To Take Break While You Are At Work!

Posts pagination

Previous 1 … 4,004 4,005 4,006 4,007 4,008 4,009 4,010 … 4,068 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-4472

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4469

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4468

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3455

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4470

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel