Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
PDF_
  • News

Shining a light on “Silent Night” Zloader/Zbot

May 22, 2020

When it comes to banking Trojans, ZeuS is probably the most famous one ever released. Since its source code originally...

Read MoreRead more about Shining a light on “Silent Night” Zloader/Zbot
cyber-crime-hackers-arrested
  • News

In Ukraine, a world-famous hacker has been detained

May 22, 2020

The press center of the Security Service of Ukraine announced the arrest of a world-famous hacker who operated under the...

Read MoreRead more about In Ukraine, a world-famous hacker has been detained
nsnxattack
  • News

Vulnerability in DNS Servers Discovered By Academics from Israel

May 22, 2020

A vulnerability in DNS servers that can be exploited to launch DDoS attacks of huge extents was as of late...

Read MoreRead more about Vulnerability in DNS Servers Discovered By Academics from Israel
carina_1
  • News

Carina – Webshell, Virtual Private Server (VPS) And cPanel Database

May 22, 2020

Carina is a web application used to store webshell, Virtual Private Server (VPS) and cPanel data. Carina is made so...

Read MoreRead more about Carina – Webshell, Virtual Private Server (VPS) And cPanel Database
nishang
  • News

Nishang – Offensive PowerShell For Red Team, Penetration Testing And Offensive Security

May 22, 2020

Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing...

Read MoreRead more about Nishang – Offensive PowerShell For Red Team, Penetration Testing And Offensive Security
Managing-Cybersecurity-in-the-Real-Estate-Industry-A-Rapid7-Customer-Story
  • News

Managing Cybersecurity in the Real Estate Industry: A Rapid7 Customer Story

May 22, 2020

Conducting cybersecurity in an industry not heavily regulated by the government still comes with its own challenges. We interviewed Tony...

Read MoreRead more about Managing Cybersecurity in the Real Estate Industry: A Rapid7 Customer Story
osint
  • News

Covid-related malspam campaign impersonates U.S. Treasury to steal taxpayer credentials

May 21, 2020

The advocacy group Abuse.ch has found a Covid-19-related malspam campaign that impersonates the U.S. Treasury Department and more than likely...

Read MoreRead more about Covid-related malspam campaign impersonates U.S. Treasury to steal taxpayer credentials
osint
  • News

10 best practices for MSPs to secure their clients and themselves from ransomware

May 21, 2020

Lock-downs and social distancing may be on, but when it comes to addressing the need for IT support—whether by current...

Read MoreRead more about 10 best practices for MSPs to secure their clients and themselves from ransomware
33
  • News

Phishing Attacks Can Now Dodge Microsoft 365’s Multi-Factor Authentication

May 21, 2020

Of late a phishing attack was found to be stealing confidential user data that was stored on the cloud. As...

Read MoreRead more about Phishing Attacks Can Now Dodge Microsoft 365’s Multi-Factor Authentication
malware_SL_pic3-990x400-2
  • News

IT threat evolution Q1 2020. Statistics

May 21, 2020

These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. Quarterly...

Read MoreRead more about IT threat evolution Q1 2020. Statistics
malware_SL_pic3-990x400-1
  • News

IT threat evolution Q1 2020

May 21, 2020

Targeted attacks and malware campaigns Operation AppleJeus: the sequel In 2018, we published a report on Operation AppleJeus, one of...

Read MoreRead more about IT threat evolution Q1 2020
WebHackersWeapons_1
  • News

Web Hacker’s Weapons – A Collection Of Cool Tools Used By Web Hackers

May 21, 2020

A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting.WeaponsType Name DescriptionArmy-Knife/ALL BurpSuite the BurpSuite project...

Read MoreRead more about Web Hacker’s Weapons – A Collection Of Cool Tools Used By Web Hackers
spray
  • News

Spray – A Password Spraying Tool For Active Directory Credentials By Jacob Wilkin(Greenwolf)

May 21, 2020

A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)Getting StartedThese instructions will show you the requirements for and...

Read MoreRead more about Spray – A Password Spraying Tool For Active Directory Credentials By Jacob Wilkin(Greenwolf)
Q-A-from-April-2020-Customer-Webcast-on-InsightVM-Dashboards-Executive-Summary-Report2
  • News

Q&A from April 2020 Customer Webcast on InsightVM Dashboards & Executive Summary Report

May 21, 2020

Our recent “Seeing 20/20 with InsightVM” customer webcast on InsightVM dashboards and executive summary report was very well-attended, and we...

Read MoreRead more about Q&A from April 2020 Customer Webcast on InsightVM Dashboards & Executive Summary Report
Ransomeware-200x200-2
  • News

Netwalker Fileless Ransomware Injected via Reflective Loading

May 20, 2020

By Karen Victor Threat actors are continuously creating more sophisticated ways for malware to evade defenses. We have observed Netwalker...

Read MoreRead more about Netwalker Fileless Ransomware Injected via Reflective Loading
osint
  • News

Six need-to-know takeaways from the Verizon breach report

May 20, 2020

Phishing attacks and stolen credentials have become attackers’ most popular avenues of network compromise, and employee errors are helping pave...

Read MoreRead more about Six need-to-know takeaways from the Verizon breach report
osint
  • News

WolfRAT malware targets WhatsApp, Messenger

May 20, 2020

A new malware called “WolfRAT is targeting messaging apps, such as WhatsApp, Facebook Messenger and Line on Thai Android devices. WolfRAT,...

Read MoreRead more about WolfRAT malware targets WhatsApp, Messenger
osint
  • News

When the coronavirus infodemic strikes

May 20, 2020

Social media sites are stepping up their efforts in the war against misinformation… specifically, the coronavirus/COVID-19 infodemic. There’s a seemingly...

Read MoreRead more about When the coronavirus infodemic strikes
IMG_0817
  • News

Hackers who were preparing attacks on hospitals arrested in Romania

May 20, 2020

Romanian law enforcement officials stopped the activities of the cybercriminal group PentaGuard, which was preparing to carry out attacks on...

Read MoreRead more about Hackers who were preparing attacks on hospitals arrested in Romania
encrypted-156514_1280
  • News

ProLock Ransomware Operators Join Hands with QakBot Trojan to Infect Victims’ Networks

May 20, 2020

'Human-operated ransomware' has been on a rise with the emergence of ProLock in the month of March, the new ransomware...

Read MoreRead more about ProLock Ransomware Operators Join Hands with QakBot Trojan to Infect Victims’ Networks
xiaomi-mint-browser-840x473-1
  • News

Is A Cheap Phone Worth The Cost Of Your Privacy?

May 20, 2020

There is absolutely no room for doubt that Chinese manufacturers offer an excess of affordable gadgets with extraordinary specs to...

Read MoreRead more about Is A Cheap Phone Worth The Cost Of Your Privacy?
IMG_0809
  • News

Co-founder of Qiwi Solonin provided Durov a loan of $17 million

May 20, 2020

Sergey Solonin, one of the founders of the Russian payment service Qiwi Group, decided to re-loan his investment in the...

Read MoreRead more about Co-founder of Qiwi Solonin provided Durov a loan of $17 million
verizon_dbir_2020-889x400-1
  • News

Verizon’s 2020 DBIR

May 20, 2020

Verizon’s 2020 DBIR is out, you can download a copy or peruse their publication online. Kaspersky was a contributor once...

Read MoreRead more about Verizon’s 2020 DBIR
self-xss_1
  • News

Self-XSS – Self-XSS Attack Using Bit.Ly To Grab Cookies Tricking Users Into Running Malicious Code

May 20, 2020

Self-XSS attack using bit.ly to grab cookies tricking users into running malicious codeHow it works?Self-XSS is a social engineering attack...

Read MoreRead more about Self-XSS – Self-XSS Attack Using Bit.Ly To Grab Cookies Tricking Users Into Running Malicious Code

Posts pagination

Previous 1 … 4,023 4,024 4,025 4,026 4,027 4,028 4,029 … 4,079 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 106[.]38[.]201[.]218:8800

May 17, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 120[.]27[.]20[.]98:10086

May 17, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]44[.]10[.]82:8840

May 17, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 124[.]221[.]30[.]83:8889

May 17, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 119[.]28[.]116[.]34:443

May 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel