Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Secure by Design A Practical Guide to Supply Chain Security for Modern Businesses

August 29, 2025
unlock_membership
  • Premium Members Content

Endpoint Protection Reimagined for Modern Enterprises

August 27, 2025
unlock_membership
  • Premium Members Content

Privacy by Design A Practical Guide to Data Protection in a Connected World

August 25, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
TorBrowser-600x271-1
  • News

What is the Dark Web? The Dark Web explained

September 17, 2021

You may have seen the Dark Web referenced in popular TV shows and have gotten the wrong idea, or if...

Read MoreRead more about What is the Dark Web? The Dark Web explained
osint
  • News

What are computer cookies?

September 17, 2021

We all know cookies as tasty baked treats that we love to eat, but computer cookies are quite different. Although...

Read MoreRead more about What are computer cookies?
1f3a7
  • News

3 security lessons from an MSP that survived the Kaseya VSA attack

September 17, 2021

Jay Tipton, chief executive for the Managed Service Provider (MSP) Technology Specialists, remembers his Fourth of July weekend this year...

Read MoreRead more about 3 security lessons from an MSP that survived the Kaseya VSA attack
thumbnail_20210915125449_1-600x338-1
  • News

HP OMEN users, update your driver now!

September 17, 2021

HP has released a patch to fix a flaw in the HP OMEN driver. As far as we know the...

Read MoreRead more about HP OMEN users, update your driver now!
osint
  • News

Ransomware scammers target artists with fake Krita revenue deals

September 17, 2021

The Krita digital painting application is currently being targeted by ransomware authors. Available on Steam and other platforms, it’s a powerful...

Read MoreRead more about Ransomware scammers target artists with fake Krita revenue deals
pietro-jeng-n6B49lTx7NM-unsplash-2
  • News

Attackers Use Cryptomining Malware to Target Organizations

September 17, 2021

 Earlier this year in June, a security researcher from security firm Sonatype uncovered six malicious payloads in the official Python...

Read MoreRead more about Attackers Use Cryptomining Malware to Target Organizations
hacker-6586113_1280
  • News

Russian hacker confirmed the resurrection of the most famous Russian hacker group REvil

September 17, 2021

 A Russian hacker who collaborated with the well-known REvil group confirmed that cybercriminals returned to active work after a two-month...

Read MoreRead more about Russian hacker confirmed the resurrection of the most famous Russian hacker group REvil
heart-rate-monitoring-device-1903997_1280
  • News

16.17 GB of User Data Stored in Fitness Bands, Exposed

September 17, 2021

 The development and sudden boom in IoT equipment in the healthcare sector have resulted in the surge of cyber attacks....

Read MoreRead more about 16.17 GB of User Data Stored in Fitness Bands, Exposed
pexels-troy-squillaci-25258712B252812529
  • News

Massachusetts is Investigating the Massive T-Mobile Data Breach

September 17, 2021

 On Tuesday, Massachusetts Attorney General Maura Healey announced that she will look into the cyberattack on T-Mobile US Inc (TMUS.O),...

Read MoreRead more about Massachusetts is Investigating the Massive T-Mobile Data Breach
ecommerce-2607114_1920
  • News

WooCommerce Multi Currency Bug Allows Customers to Modify the Cost of Items on Online Stores

September 17, 2021

 A security flaw in the WooCommerce Multi Currency plugin might allow any consumer to alter product prices in online stores....

Read MoreRead more about WooCommerce Multi Currency Bug Allows Customers to Modify the Cost of Items on Online Stores
sl-summer-kids-pixel-game-990x400-1
  • News

Summer 2021: Friday Night Funkin’, Måneskin and pop it

September 17, 2021

This summer, several events that were postponed from 2020 due to the pandemic took place. Some of them interested children,...

Read MoreRead more about Summer 2021: Friday Night Funkin’, Måneskin and pop it
revil
  • Data Breach
  • Ransomware

REvil Happy Blog Ransomware Victim: Spiezle Architectural Group Inc[.]

September 17, 2021

REvil Happy Blog NOTE: The information on this page is automated and scraped directly from the Revil Happy Blog page...

Read MoreRead more about REvil Happy Blog Ransomware Victim: Spiezle Architectural Group Inc[.]
DNSTake
  • Tools

DNSTake – A Fast Tool To Check Missing Hosted DNS Zones That Can Lead To Subdomain Takeover

September 17, 2021

A fast tool to check missing hosted DNS zones that can lead to subdomain takeover. What is a DNS takeover?DNS...

Read MoreRead more about DNSTake – A Fast Tool To Check Missing Hosted DNS Zones That Can Lead To Subdomain Takeover
CVE-2021-40444_3_calc
  • Tools

CVE-2021-40444 PoC – Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)

September 17, 2021

Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)Creation of this Script is based on some reverse...

Read MoreRead more about CVE-2021-40444 PoC – Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)
plution_1-714956
  • Tools

Plution – Prototype Pollution Scanner Using Headless Chrome

September 17, 2021

Plution is a convenient way to scan at scale for pages that are vulnerable to client side prototype pollution via...

Read MoreRead more about Plution – Prototype Pollution Scanner Using Headless Chrome
kali-linux-2021.3-release
  • Tools

Kali Linux 2021.3 – Penetration Testing and Ethical Hacking Linux Distribution

September 17, 2021

Time for another Kali Linux release! – Kali Linux 2021.1. This release has various impressive updates.A summary of the changes...

Read MoreRead more about Kali Linux 2021.3 – Penetration Testing and Ethical Hacking Linux Distribution
osint
  • News

Bitdefender released free REvil ransomware decryptor that works for past victims

September 16, 2021

Researchers from Bitdefender released a free master decryptor for the REvil ransomware operation that allows past victims to recover their...

Read MoreRead more about Bitdefender released free REvil ransomware decryptor that works for past victims
osint
  • News

Anonymous hacked the controversial, far-right web host Epik

September 16, 2021

Anonymous claims to have hacked the controversial web hosting provider Epik, known for allowing far-right, neo-Nazi, and other extremist content....

Read MoreRead more about Anonymous hacked the controversial, far-right web host Epik
osint
  • News

OMIGOD vulnerabilities expose thousands of Azure users to hack

September 16, 2021

OMIGOD – Microsoft addressed four vulnerabilities in the Open Management Infrastructure (OMI) software agent that could expose Azure users to...

Read MoreRead more about OMIGOD vulnerabilities expose thousands of Azure users to hack
osint
  • News

Microsoft announces passwordless authentication for consumer accounts

September 16, 2021

Microsoft announced that users can access their consumer accounts without providing passwords and using more secure authentication methods. Microsoft will...

Read MoreRead more about Microsoft announces passwordless authentication for consumer accounts
CVE-prog
  • Vulnerabilities

CVE-2020-11581

September 16, 2021

Summary: An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on...

Read MoreRead more about CVE-2020-11581
CVE-prog
  • Vulnerabilities

CVE-2021-30766

September 16, 2021

Summary: An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.5, Security...

Read MoreRead more about CVE-2021-30766
CVE-prog
  • Vulnerabilities

CVE-2021-30795

September 16, 2021

Summary: A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari...

Read MoreRead more about CVE-2021-30795
CVE-prog
  • Vulnerabilities

CVE-2021-21897

September 16, 2021

Summary: A code execution vulnerability exists in the DL_Dxf::handleLWPolylineData functionality of Ribbonsoft dxflib 3.17.0. A specially-crafted .dxf file can lead...

Read MoreRead more about CVE-2021-21897

Posts pagination

Previous 1 … 4,034 4,035 4,036 4,037 4,038 4,039 4,040 … 4,385 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

unlock_membership
  • Premium Members Content

Secure by Design A Practical Guide to Supply Chain Security for Modern Businesses

August 29, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 171[.]244[.]143[.]184:4443

August 29, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]143[.]229[.]126:443

August 29, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 117[.]72[.]39[.]83:443

August 29, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 175[.]178[.]85[.]21:443

August 29, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel