Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Targeted-attacks-1-200x125-1
  • News

Gamaredon APT Group Use Covid-19 Lure in Campaigns

April 18, 2020

By Hiroyuki Kakara and Erina Maruyama Gamaredon is an advanced persistent threat (APT) group that has been active since 2013....

Read MoreRead more about Gamaredon APT Group Use Covid-19 Lure in Campaigns
rootkit-feature-200x200-1
  • News

Exposing Modular Adware: How DealPly, IsErIk, and ManageX Persist in Systems

April 18, 2020

By RonJay Caragay, Fe Cureg, Ian Lagrazon, Erika Mendoza, and Jay Yaneza (Threats Analysts) Adware isn’t new and they don’t...

Read MoreRead more about Exposing Modular Adware: How DealPly, IsErIk, and ManageX Persist in Systems
discordbots5-300x252-1
  • News

Discord users tempted by bots offering “free Nitro games”

April 18, 2020

The last few weeks have seen multiple instances of problematic bots appearing in Discord channels. They bring tidings of gifts,...

Read MoreRead more about Discord users tempted by bots offering “free Nitro games”
osint
  • News

BT Tower Delays Huawei’s Removal from EE Company’s Network by 2 Years

April 18, 2020

BT Tower, which is a communication tower in London, further suspends the replacement of Huawei from the EE company's core...

Read MoreRead more about BT Tower Delays Huawei’s Removal from EE Company’s Network by 2 Years
55
  • News

Double Extortion- A Ransomware Tactic That Leaves The Victims With No Choice!

April 18, 2020

Per reports of the researchers, the attackers would always release some kind of proof that they have the extremely valuable...

Read MoreRead more about Double Extortion- A Ransomware Tactic That Leaves The Victims With No Choice!
fraud2Balert
  • News

Linksys asks users to reset their smart wifi passwords after DNS routers were hacked

April 18, 2020

Linksys, a router developing firm asked its users to reset passwords to their smart wifi accounts after some of the...

Read MoreRead more about Linksys asks users to reset their smart wifi passwords after DNS routers were hacked
privilege-escalation-awesome-scripts-suite_1_peass
  • News

PEASS – Privilege Escalation Awesome Scripts SUITE

April 18, 2020

Here you will find privilege escalation tools for Windows and Linux/Unix* (in some near future also for Mac).These tools search...

Read MoreRead more about PEASS – Privilege Escalation Awesome Scripts SUITE
pwndrop_3_demo1
  • News

Pwndrop – Self-Deployable File Hosting Service For Red Teamers, Allowing To Easily Upload And Share Payloads Over HTTP And WebDAV

April 18, 2020

pwndrop is a self-deployable file hosting service for sending out red teaming payloads or securely sharing your private files over...

Read MoreRead more about Pwndrop – Self-Deployable File Hosting Service For Red Teamers, Allowing To Easily Upload And Share Payloads Over HTTP And WebDAV
osint
  • News

U.S. offers up to $5M for info on North Korean cyber activity

April 17, 2020

Four U.S. federal agencies on Wednesday jointly issued an advisory that warns of ongoing North Korea-sponsored cyberthreat operations, and offers...

Read MoreRead more about U.S. offers up to $5M for info on North Korean cyber activity
figure1
  • News

New AgentTesla variant steals WiFi credentials

April 17, 2020

AgentTesla is a .Net-based infostealer that has the capability to steal data from different applications on victim machines, such as...

Read MoreRead more about New AgentTesla variant steals WiFi credentials
osint
  • News

Biometric Data Exposure Vulnerability in OnePlus 7 Pro Android Phones Highlighted TEE Issues

April 17, 2020

In July 2019, London based Synopsys Cybersecurity Research Center discovered a vulnerability in OnePlus 7 Pro devices manufactured by Chinese...

Read MoreRead more about Biometric Data Exposure Vulnerability in OnePlus 7 Pro Android Phones Highlighted TEE Issues
tablet-1442900_1280
  • News

Android users may face hacker attacks under the guise of applications about coronavirus

April 17, 2020

Cybercriminals attack users of Android mobile devices using malicious applications disguised as legitimate information software about the new COVID-19 coronavirus...

Read MoreRead more about Android users may face hacker attacks under the guise of applications about coronavirus
osint
  • News

COVID 19 Contact Tracing: Is your Privacy at Risk?

April 17, 2020

Apple and Google's latest team up together to build a technology that will help trace the spread of coronavirus is...

Read MoreRead more about COVID 19 Contact Tracing: Is your Privacy at Risk?
moscow-1556561_1280
  • News

Moscow is turning into a “digital concentration camp”, say locals

April 17, 2020

The Moscow authorities refused to issue 900 thousand digital passes per day due to incorrect information submitted by the applicants....

Read MoreRead more about Moscow is turning into a “digital concentration camp”, say locals
finance_report_intro-990x400-1
  • News

Financial Cyberthreats in 2019

April 17, 2020

Methodology Financial cyberthreats are malicious programs that target users of services such as online banking, e-money, and cryptocurrency, or that...

Read MoreRead more about Financial Cyberthreats in 2019
dnsprobe_5_dnsprobe-run
  • News

DNSProbe – A Tool Built On Top Of Retryabledns That Allows You To Perform Multiple DNS Queries Of Your Choice With A List Of User Supplied Resolvers

April 17, 2020

DNSProbe is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice...

Read MoreRead more about DNSProbe – A Tool Built On Top Of Retryabledns That Allows You To Perform Multiple DNS Queries Of Your Choice With A List Of User Supplied Resolvers
Crescendo_2_demo
  • News

Crescendo – A Swift Based, Real Time Event Viewer For macOS – It Utilizes Apple’s Endpoint Security Framework

April 17, 2020

Crescendo is a swift based, real time event viewer for macOS. It utilizes Apple's Endpoint Security Framework.Getting StartedApple has introduced...

Read MoreRead more about Crescendo – A Swift Based, Real Time Event Viewer For macOS – It Utilizes Apple’s Endpoint Security Framework
boston-massachusetts-masscyber
  • News

How the MassCyberCenter Helps Elevate Cybersecurity Initiatives in Municipalities

April 17, 2020

On this week’s episode of Security Nation, we had the pleasure of speaking with Stephanie Helm, director of the Massachusetts...

Read MoreRead more about How the MassCyberCenter Helps Elevate Cybersecurity Initiatives in Municipalities
Scanning
  • News

Nmap Service Detection for Nexpose and InsightVM Scan Engines

April 17, 2020

As of version 6.6.14 of Nexpose and InsightVM, the Scan Engine can now utilize Nmap service probes in addition to...

Read MoreRead more about Nmap Service Detection for Nexpose and InsightVM Scan Engines
osint
  • News

Mass surveillance alone will not save us from coronavirus

April 16, 2020

As the pattern-shattering truth of our new lives drains heavy—as coronavirus rends routines, raids our wellbeing, and whiplashes us between...

Read MoreRead more about Mass surveillance alone will not save us from coronavirus
images
  • News

Best Practice Tips for Password Administration from Tech Security Insiders

April 16, 2020

Passwords have been an industry-standard as well as industry headache for a considerable length of time and their administration henceforth...

Read MoreRead more about Best Practice Tips for Password Administration from Tech Security Insiders
osint
  • News

Law Firms in Manitoba at a virtual standstill after being attacked by Maze ransomware!

April 16, 2020

Two law firms of Manitoba Law society have been hit by ransomware named Maze locking up their whole system and...

Read MoreRead more about Law Firms in Manitoba at a virtual standstill after being attacked by Maze ransomware!
burp-exporter_1_Screenshot_Exporter_01
  • News

Burp Exporter – A Burp Suite Extension To Copy A Request To The Clipboard As Multiple Programming Languages Functions

April 16, 2020

Exporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions.You can export...

Read MoreRead more about Burp Exporter – A Burp Suite Extension To Copy A Request To The Clipboard As Multiple Programming Languages Functions
crauEmu_1_crauEmu_logo
  • News

crauEmu – An uEmu Extension For Developing And Analyzing Payloads For Code-Reuse Attacks

April 16, 2020

crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks.Slides from ZeroNights 2019Demo 1 - X32-64, Edge,...

Read MoreRead more about crauEmu – An uEmu Extension For Developing And Analyzing Payloads For Code-Reuse Attacks

Posts pagination

Previous 1 … 4,032 4,033 4,034 4,035 4,036 4,037 4,038 … 4,079 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

cybercrime
  • News

Dilettante Dev Wrote Rubbish, Left No Logs, And Had No Idea Why His App Wasn’tworking

May 17, 2025
cybercrime
  • News

Google Deepmind Promises To Help You Evolve Your Algos

May 17, 2025
cybercrime
  • News

Snowflake Ciso On The Power Of ‘shared Destiny’ And ‘yes And’

May 17, 2025
cybercrime
  • News

Anthropic’s Law Firm Throws Claude Under The Bus Over Citation Errors In Courtfiling

May 17, 2025
cybercrime
  • News

Cyber Fiends Battering Uk Retailers Now Turn To Us Stores

May 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel