Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Australia: TikTok Undergoing Scrutiny Over Data Security Concerns

July 23, 2020

Chinese video-sharing social networking platform, TikTok is undergoing scrutinization in Australia over data security and privacy concerns, according to the...

Read MoreRead more about Australia: TikTok Undergoing Scrutiny Over Data Security Concerns
abstractpicture9990897-990x400-1
  • News

MATA: Multi-platform targeted malware framework

July 23, 2020

As the IT and OT environment becomes more complex, adversaries are quick to adapt their attack strategy. For example, as...

Read MoreRead more about MATA: Multi-platform targeted malware framework
lazybee_5
  • News

Lazybee – Wordlist Generator Tool for Termux

July 23, 2020

Lazybee tool is a python based script from which you can generate random wordlist for brutefocre attacks. This tool has...

Read MoreRead more about Lazybee – Wordlist Generator Tool for Termux
QA
  • News

Q&A from June 2020 Customer Webcast on InsightVM Custom Policy Builder

July 23, 2020

This blog was co-authored by Naveen Bibinagar, Greg Wiseman, and Joel Kinzel.During our most recent “Seeing 20/20 with InsightVM” customer...

Read MoreRead more about Q&A from June 2020 Customer Webcast on InsightVM Custom Policy Builder
mailsecuritycheck-1
  • News

Chinese APT group targets India and Hong Kong using new variant of MgBot malware

July 22, 2020

This blog post was authored by Hossein Jazi and Jérôme Segura On July 2, we found an archive file with...

Read MoreRead more about Chinese APT group targets India and Hong Kong using new variant of MgBot malware
IMG_1920
  • News

Russian Foreign Ministry urged whole world to abandon cyber attacks on healthcare facilities during a pandemic

July 22, 2020

Against the background of the coronavirus pandemic, Moscow calls for an end to cyberattacks on healthcare facilities and critical infrastructure....

Read MoreRead more about Russian Foreign Ministry urged whole world to abandon cyber attacks on healthcare facilities during a pandemic
osint
  • News

Importance of Cybersecurity in the Healthcare Sector

July 22, 2020

Hackers and cybercriminals have targeted the healthcare sector for a long time. Among the healthcare industry, hospitals are generally the...

Read MoreRead more about Importance of Cybersecurity in the Healthcare Sector
download
  • News

Litigation Firm Discovers a New Phishing Scam Falsely Purporting To Be From Leading UK Supermarket

July 22, 2020

A litigation firm discovered a new phishing scam falsely indicating to be from a leading UK supermarket Tesco. The scam had...

Read MoreRead more about Litigation Firm Discovers a New Phishing Scam Falsely Purporting To Be From Leading UK Supermarket
abstract_blur_code-990x400-1
  • News

GReAT thoughts: Awesome IDA Pro plugins

July 22, 2020

The Global Research & Analysis Team here at Kaspersky has a tradition of meeting up once a month and sharing...

Read MoreRead more about GReAT thoughts: Awesome IDA Pro plugins
ADB-Toolkit_7_git1
  • News

ADB-Toolkit – Tool for testing your Android device

July 22, 2020

ADB-Toolkit is a BASH Script with 28 options and an METASPLOIT Section which has 6 options which is made to...

Read MoreRead more about ADB-Toolkit – Tool for testing your Android device
hackerEnv_5
  • News

hackerEnv – An Automation Tool That Quickly And Easily Sweep IPs And Scan Ports, Vulnerabilities And Exploit Them

July 22, 2020

hackerEnv is an automation tool that quickly and easily sweep IPs and scan ports, vulnerabilities and exploit them. Then, it...

Read MoreRead more about hackerEnv – An Automation Tool That Quickly And Easily Sweep IPs And Scan Ports, Vulnerabilities And Exploit Them
Deception
  • News

Defense in Depth Using Deception Technology in InsightIDR

July 22, 2020

Welcome to the land of confusion and misdirection! Today, we are diving into the four pieces of Another suggestion for...

Read MoreRead more about Defense in Depth Using Deception Technology in InsightIDR
osint
  • News

Lock and Code S1Ep11: Locating concerns of Bluetooth and beacon technology with Chris Boyd

July 21, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep11: Locating concerns of Bluetooth and beacon technology with Chris Boyd
IMG_1914
  • News

Representatives of the Russian government commented on the statements of Western media about the attack of “Russian Hackers”

July 21, 2020

The media of the United Kingdom and the United States are working in the interests of the authorities, trying to...

Read MoreRead more about Representatives of the Russian government commented on the statements of Western media about the attack of “Russian Hackers”
osint
  • News

VPN Services Reportedly Leaked Around 1.2TB User Data Containing Sensitive Information

July 21, 2020

A recent discovery by a tech service company has taken the world by storm. The VPN services may not be...

Read MoreRead more about VPN Services Reportedly Leaked Around 1.2TB User Data Containing Sensitive Information
peniot_1
  • News

PENIOT – Penetration Testing Tool for IoT

July 21, 2020

PENIOT is a penetration testing tool for Internet of Things (IoT) devices. It helps you to test/penetrate your devices by...

Read MoreRead more about PENIOT – Penetration Testing Tool for IoT
Lazymux_1_lazymux2
  • News

Lazymux – A Huge List Of Many Hacking Tools And PEN-TESTING Tools

July 21, 2020

Lazymux tools installer is very easy to use, only provided for lazy termux users; it's huge list of Many Hacking...

Read MoreRead more about Lazymux – A Huge List Of Many Hacking Tools And PEN-TESTING Tools
NICER-2020-1-
  • News

Rapid7 Releases 2020 NICER Report

July 21, 2020

Rapid7 has just released the 2020 National / Industry / Cloud Exposure Report, affectionately called the NICER report (you know,...

Read MoreRead more about Rapid7 Releases 2020 NICER Report
IMG_1872
  • News

Three countries have accused Russia of trying to steal data on the vaccine

July 20, 2020

The UK's National Cyber Security Center (NCSC) said that Russian hackers, led by Russian intelligence agencies, tried to steal information...

Read MoreRead more about Three countries have accused Russia of trying to steal data on the vaccine
camera-1124585_1280
  • News

Vulnerabilities with AvertX IP security cameras

July 20, 2020

Palo Alto Networks Unit 42, this February found three vulnerabilities present in AvertX IP cameras in their latest version.These three...

Read MoreRead more about Vulnerabilities with AvertX IP security cameras
Keylogger_1_Ads2525C42525B1z
  • News

Keylogger – Get Keyboard, Mouse, ScreenShot, Microphone Inputs From Target Computer And Send To Your Mail

July 20, 2020

Inputs To Mail.Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information...

Read MoreRead more about Keylogger – Get Keyboard, Mouse, ScreenShot, Microphone Inputs From Target Computer And Send To Your Mail
Bramble_1
  • News

Bramble – A Hacking Open Source Suite

July 20, 2020

Bramble software has been designed for the bramble project. It incorporates many features of pentesting and IT Security. It's easy...

Read MoreRead more about Bramble – A Hacking Open Source Suite
osint
  • News

Black Box: A New ATM Attack that Diebold Nixdorf Warns Off

July 19, 2020

A unique kind of ATM attack has come to surface called "Black Box." ATM developer Nixdorf warns the financial sector...

Read MoreRead more about Black Box: A New ATM Attack that Diebold Nixdorf Warns Off
antenna-2123797_960_720
  • News

Orange Confirms Ransomware Attack Compromising Data of 20 Enterprise Customers

July 19, 2020

Orange, the fourth-largest mobile operator in Europe has confirmed that it fell prey to a ransomware attack wherein hackers accessed...

Read MoreRead more about Orange Confirms Ransomware Attack Compromising Data of 20 Enterprise Customers

Posts pagination

Previous 1 … 4,007 4,008 4,009 4,010 4,011 4,012 4,013 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]8[.]233[.]224:81

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 118[.]178[.]192[.]36:8092

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 196[.]251[.]83[.]52:80

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]200[.]183[.]130:80

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 193[.]188[.]23[.]150:443

May 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel