Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Windows
  • News

Windows DNS Server Remote Code Execution Vulnerability (CVE-2020-1350): What You Need to Know

July 15, 2020

On Tuesday, July 14, 2020, Microsoft released a patch for a 17-year-old remote code execution (RCE) vulnerability in Windows Domain...

Read MoreRead more about Windows DNS Server Remote Code Execution Vulnerability (CVE-2020-1350): What You Need to Know
SAP
  • News

CVE-2020-6287: Critical Vulnerability in SAP NetWeaver Application Server (AS) Java

July 15, 2020

This blog post was co-authored by Scott King, Brian Carey, and Justin Berry.Overview of business impact and implications of CVE-2020-6287This...

Read MoreRead more about CVE-2020-6287: Critical Vulnerability in SAP NetWeaver Application Server (AS) Java
osint
  • News

SIGRed – CVE-2020-1350 – Wormable DNS

July 14, 2020

SIGRed (CVE-2020-1350) is a wormable, critical vulnerability (CVSS base score of 10.0) in the Windows DNS server that affects Windows...

Read MoreRead more about SIGRed – CVE-2020-1350 – Wormable DNS
osint
  • News

Stalkerware advertising ban by Google a welcome, if incomplete, step

July 14, 2020

On Friday, July 10, Google announced it would no longer allow advertising for spyware and similar surveillance technology—often referred to...

Read MoreRead more about Stalkerware advertising ban by Google a welcome, if incomplete, step
x64dbg_14
  • News

X64Dbg – An Open-Source X64/X32 Debugger For Windows

July 14, 2020

An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the...

Read MoreRead more about X64Dbg – An Open-Source X64/X32 Debugger For Windows
Unlocking-the-Power-of-Macro-Authentication-in-Application-Security-Part-Three
  • News

Unlocking the Power of Macro Authentication in Application Security: Part Three

July 14, 2020

This blog post is part three of our three-part series on macro authentication. Be sure to catch up on part...

Read MoreRead more about Unlocking the Power of Macro Authentication in Application Security: Part Three
abstract-money-990x400-1
  • News

The Tetrade: Brazilian banking malware goes global

July 14, 2020

Introduction Brazil is a well-known country with plenty of banking trojans developed by local crooks. The Brazilian criminal underground is...

Read MoreRead more about The Tetrade: Brazilian banking malware goes global
  • Smart Home

5 Best Smart Home Hubs 2020

July 14, 2020

What once seemed like science fiction is now a reality: we are building smart homes. However, the more smart devices...

Read MoreRead more about 5 Best Smart Home Hubs 2020
osint
  • News

More Chinese tax software found to dish out backdoor malware

July 14, 2020

A second tax software program associated with the Chinese banking industry has now been found to contain an embedded backdoor...

Read MoreRead more about More Chinese tax software found to dish out backdoor malware
osint
  • News

A week in security (July 6 – 12)

July 14, 2020

Last week on Malwarebytes Labs, we took an in-depth look at card skimmers targeting ASP sites, we released another episode...

Read MoreRead more about A week in security (July 6 – 12)
IMG_1816
  • News

Telegraph service was unblocked in Russia

July 14, 2020

Russia stopped blocking the popular Telegram messenger almost a month ago. However, the related Telegraph service continued to be blocked....

Read MoreRead more about Telegraph service was unblocked in Russia
osint
  • News

Zoom Zero-Day Allowed Remote Code Execution, Patch Issued

July 14, 2020

Video and audio conferencing software, Zoom patched a zero-day vulnerability that was affecting users running old versions of Windows: Windows...

Read MoreRead more about Zoom Zero-Day Allowed Remote Code Execution, Patch Issued
143501-tr
  • News

Trojans, Backdoors and Droppers the Top Three Malware Globally?

July 14, 2020

According to a few recent surveys and analysis conducted by some well-known and influential cybersecurity agencies, there are approximately 3...

Read MoreRead more about Trojans, Backdoors and Droppers the Top Three Malware Globally?
osint
  • News

How Content Abuse is giving rise to online Frauds, explains SIFT

July 14, 2020

A report from Sift on 'Content Abuse and the Fraud Economy' explores the rising arena of online frauds and content...

Read MoreRead more about How Content Abuse is giving rise to online Frauds, explains SIFT
dronesploit_8
  • News

DroneSploit – Drone Pentesting Framework Console

July 14, 2020

This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on...

Read MoreRead more about DroneSploit – Drone Pentesting Framework Console
padding-oracle-attacker_1_poattack-decrypt
  • News

Padding-Oracle-Attacker – CLI Tool And Library To Execute Padding Oracle Attacks Easily

July 14, 2020

CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.InstallMake...

Read MoreRead more about Padding-Oracle-Attacker – CLI Tool And Library To Execute Padding Oracle Attacks Easily
Citizen-Science-and-Medical-Consumerism-Confronting-the-Tech-Wisdom-Gap-in-Modern-Healthcare
  • News

Citizen Science and Medical Consumerism: Confronting the Tech Wisdom Gap in Modern Healthcare

July 14, 2020

In our latest episode of Security Nation, we spoke with Nina Alli, executive director of the Biohacking Village, to discuss...

Read MoreRead more about Citizen Science and Medical Consumerism: Confronting the Tech Wisdom Gap in Modern Healthcare
SCOTUS
  • News

Rapid7 joins CFAA brief to the Supreme Court

July 14, 2020

Rapid7 joined a brief to the US Supreme Court on the chilling effect of the overbroad Computer Fraud and Abuse...

Read MoreRead more about Rapid7 joins CFAA brief to the Supreme Court
IMG_1786
  • News

Azerbaijani hackers obtained information from the Armenian Ministry of Defense

July 13, 2020

Passport data of several hundred Armenian citizens, including military personnel, as well as documents related to the Republic's military units,...

Read MoreRead more about Azerbaijani hackers obtained information from the Armenian Ministry of Defense
osint
  • News

The Need for Smart Cities in the Post-Pandemic World

July 13, 2020

Due to coronavirus pandemic, there has been a lockdown worldwide, and it seems, the streets and the normal life has...

Read MoreRead more about The Need for Smart Cities in the Post-Pandemic World
debotnet_8_debotnet-intro
  • News

Debotnet – A Tiny Portable Tool For Controlling Windows 10’s Many Privacy-Related Settings And Keep Your Personal Data Private

July 13, 2020

A free and portable tool for controlling Windows 10's many privacy-related settings and keep your personal data private.Your preparation for...

Read MoreRead more about Debotnet – A Tiny Portable Tool For Controlling Windows 10’s Many Privacy-Related Settings And Keep Your Personal Data Private
santa_4
  • News

Santa – A Binary Whitelisting/Blacklisting System For macOS

July 13, 2020

Santa is a binary whitelisting/blacklisting system for macOS. It consists of a kernel extension (or a system extension on macOS...

Read MoreRead more about Santa – A Binary Whitelisting/Blacklisting System For macOS
Microsoft_account_phishing
  • News

Microsoft Office 365 Users Targeted By a New Phishing Campaign Using Fake Zoom Notifications

July 12, 2020

As people across the world struggle to survive the onslaught of the corona pandemic by switching to the work-from-home criteria,...

Read MoreRead more about Microsoft Office 365 Users Targeted By a New Phishing Campaign Using Fake Zoom Notifications
findom-xss_2
  • News

FinDOM-XSS – A Fast DOM Based XSS Vulnerability Scanner With Simplicity

July 12, 2020

FinDOM-XSS is a tool that allows you to finding for possible and/ potential DOM based XSS vulnerability in a fast...

Read MoreRead more about FinDOM-XSS – A Fast DOM Based XSS Vulnerability Scanner With Simplicity

Posts pagination

Previous 1 … 4,009 4,010 4,011 4,012 4,013 4,014 4,015 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[RHYSIDA] – Ransomware Victim: Termolar

May 18, 2025
7cb8a3910bd0efb0f8aefa9ab10aff40d342312053a22dcbc18aafcd1b07062b
  • News

No Boom Supersonic Flights Could Slide Through Us Skies Soon

May 18, 2025
075ce0ad2dfe239f157b7fabaac1cafa73c3cd82465ee6ace7503a9e41011043
  • News

Some English Hospitals Doubt Palantir’s Utility: We’d ‘lose Functionality Ratherthan Gain It’

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]201[.]74[.]112:8443

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]120[.]13[.]85:8889

May 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel