Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Secure Coding Practices to Protect Your Software

June 27, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for Robust Cyber Defense

June 25, 2025
unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Liker – 465,141 breached accounts

March 13, 2021

In March 2020, the self-proclaimed "kinder, smarter social network" Liker suffered a data breach, allegedly in retaliation for the Gab...

Read MoreRead more about Liker – 465,141 breached accounts
exchange-1
  • News

Ransomware is targeting vulnerable Microsoft Exchange servers

March 13, 2021

The Microsoft Exchange attacks using the ProxyLogon vulnerability, and previously associated with the dropping of malicious web shells, are taking...

Read MoreRead more about Ransomware is targeting vulnerable Microsoft Exchange servers
osint
  • News

150,000 Verkada security cameras hacked—to make a point

March 13, 2021

Hackers were able to gain access to camera feeds from Verkada, a tech company that specializes in video security and...

Read MoreRead more about 150,000 Verkada security cameras hacked—to make a point
ransomware-2320941_1920
  • News

Several Americans Affected by Netgain Ransomware Attack

March 13, 2021

 The number of Americans influenced by a cyber assault on a cloud facilitating and IT services provider has expanded by...

Read MoreRead more about Several Americans Affected by Netgain Ransomware Attack
podcast-5255264_1920
  • News

A Bug in iPhone Call Recording App Exposed Clients Data

March 13, 2021

 A security vulnerability in a famous iPhone call recording application exposed thousands of users' recorded conversations. The flaw was found...

Read MoreRead more about A Bug in iPhone Call Recording App Exposed Clients Data
florian-olivo-Ek9Znm8lQ1U-unsplash-1
  • News

Ryuk Ransomware Hits Spain’s Employment Agency

March 13, 2021

 The Spanish State Employment Service (SEPE) has been targeted by a ransomware attack which has resulted in hundreds of offices...

Read MoreRead more about Ryuk Ransomware Hits Spain’s Employment Agency
norway-parliament-building-oslo-night-storting-seat-85198340
  • News

Norway Parliament, Storting, Hit by a Microsoft Exchange Cyber Attack

March 13, 2021

 Yet again for the second time in about six months, Norway's parliament has been hacked. Government officials acknowledged the infiltration...

Read MoreRead more about Norway Parliament, Storting, Hit by a Microsoft Exchange Cyber Attack
green_digits_abstract-990x400-1
  • News

Good old malware for the new Apple Silicon platform

March 13, 2021

Introduction A short while ago, Apple released Mac computers with the new chip called Apple M1. The unexpected release was...

Read MoreRead more about Good old malware for the new Apple Silicon platform
Go-RouterSocks_1_schema
  • Tools

Go-RouterSocks – Router Sock. One Port Socks For All The Others.

March 13, 2021

The next step after compromising a machine is to enumerate the network behind. Many tools exist to expose a socks...

Read MoreRead more about Go-RouterSocks – Router Sock. One Port Socks For All The Others.
1f4f0
  • News

Internet disruption in Russia coincided with the introduction of restrictions

March 12, 2021

Experts at the NetBlocks Internet Observatory observed this week a temporary disruption of internet service in Russia due to new...

Read MoreRead more about Internet disruption in Russia coincided with the introduction of restrictions
osint
  • News

Researchers warn of a surge in cyber attacks against Microsoft Exchange

March 12, 2021

Researchers warn of a surge in cyber attacks against Microsoft Exchange servers exploiting the recently disclosed ProxyLogon vulnerabilities. Researchers at...

Read MoreRead more about Researchers warn of a surge in cyber attacks against Microsoft Exchange
osint
  • News

Malspam campaign uses icon files to delivers NanoCore RAT

March 12, 2021

Researchers at Trustwave spotted a new malspam campaign that is abusing icon files to trick victims into installing the NanoCore...

Read MoreRead more about Malspam campaign uses icon files to delivers NanoCore RAT
1f6a8
  • News

Expert publishes PoC exploit code for Microsoft Exchange flaws

March 12, 2021

This week a security researcher published on GitHub a proof-of-concept tool to hack Microsoft Exchange servers chaining two of ProxyLogon...

Read MoreRead more about Expert publishes PoC exploit code for Microsoft Exchange flaws
image-18
  • Hack The Box
  • Premium Members Content

Hack the box guide to: Phonebook

March 12, 2021

Phonebook - 30 points So at always lets fire up burp and visit the page to see what is there...

Read MoreRead more about Hack the box guide to: Phonebook
CVE-prog
  • Vulnerabilities

CVE-2020-27869

March 12, 2021

Summary: This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM:...

Read MoreRead more about CVE-2020-27869
CVE-prog
  • Vulnerabilities

CVE-2020-27871

March 12, 2021

Summary: This vulnerability allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1. Although authentication...

Read MoreRead more about CVE-2020-27871
CVE-prog
  • Vulnerabilities

CVE-2020-27874

March 12, 2021

Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is...

Read MoreRead more about CVE-2020-27874
CVE-prog
  • Vulnerabilities

CVE-2020-29020

March 12, 2021

Summary: Improper Access Control vulnerability in web service of Secomea SiteManager allows remote attacker to access the web UI from...

Read MoreRead more about CVE-2020-29020
CVE-prog
  • Vulnerabilities

CVE-2020-29032

March 12, 2021

Summary: Upload of Code Without Integrity Check vulnerability in firmware archive of Secomea GateManager allows authenticated attacker to execute malicious...

Read MoreRead more about CVE-2020-29032
SKY_ECC_statement-600x393-1
  • News

Police credit “unlocked” SKY ECC encryption for organized crime bust

March 12, 2021

At the moment, I’m really torn, and I need your help. Let me tell you what is going on. I...

Read MoreRead more about Police credit “unlocked” SKY ECC encryption for organized crime bust
server_choices-318x600-1
  • News

5 common VPN myths busted

March 12, 2021

Virtual Private Networks (VPNs) are popular but often misunderstood. There are many misconceptions about them—misconceptions that may be stopping people...

Read MoreRead more about 5 common VPN myths busted
cell-phone-1245663_1280
  • News

Russian authorities slow access to Twitter over banned content

March 12, 2021

 The Federal Service for Supervision of Communications, Information Technology and Mass Media (Roskomnadzor)  accused Twitter of numerous violations and failure...

Read MoreRead more about Russian authorities slow access to Twitter over banned content
sara-kurfess-B4ndBW2R_Q8-unsplash
  • News

After OTP Issues,TRAI Suspends New SMS Rules For 7 Days

March 12, 2021

 The Telecom Regulatory Authority of India (TRAI) has temporarily suspended its new rules for curbing spam messages, following major disruptions...

Read MoreRead more about After OTP Issues,TRAI Suspends New SMS Rules For 7 Days
malicious-code-4036349_1920
  • News

Malware WannaCry And Vulnerability EternalBlue Remain at Large

March 12, 2021

 One specific aspect of malware and one vulnerability continues to develop as security companies have been reconstructing the highest trends...

Read MoreRead more about Malware WannaCry And Vulnerability EternalBlue Remain at Large

Posts pagination

Previous 1 … 4,008 4,009 4,010 4,011 4,012 4,013 4,014 … 4,190 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-6350

June 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-39730

June 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6379

June 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-36027

June 29, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-36026

June 29, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel