Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-blue-digital-man-990x400-1
  • News

Hunting APTs with YARA

March 19, 2020

For the past few years, we have been spreading our knowledge and experience of using YARA, often called a pattern...

Read MoreRead more about Hunting APTs with YARA
chepy_1_logo
  • News

Chepy – A Python Lib/Cli Equivalent Of The Awesome CyberChef Tool.

March 19, 2020

Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef....

Read MoreRead more about Chepy – A Python Lib/Cli Equivalent Of The Awesome CyberChef Tool.
sshuttle
  • News

Sshuttle – Transparent Proxy Server That Works As A Poor Man’S VPN. Forwards Over SSH

March 19, 2020

As far as I know, sshuttle is the only program that solves the following common case:Your client machine (or router)...

Read MoreRead more about Sshuttle – Transparent Proxy Server That Works As A Poor Man’S VPN. Forwards Over SSH
cybersecurity-posture-
  • News

How to Maintain Your Cybersecurity Posture in Uncertain Times

March 19, 2020

Right now, we are all dealing with uncertain times, given the COVID-19 pandemic. The organizations we work for are depending...

Read MoreRead more about How to Maintain Your Cybersecurity Posture in Uncertain Times
osint
  • News

COVID-19 decoy doc, Cloudflare service used to spread ‘BlackWater’ malware

March 18, 2020

Researchers have uncovered a new malware campaign that uses the COVID-19 pandemic as a lure, and also abuses platform-as-a-service web...

Read MoreRead more about COVID-19 decoy doc, Cloudflare service used to spread ‘BlackWater’ malware
child-victim-experian-600x214-1
  • News

Child identity theft, part 2: How to reclaim your child’s identity

March 18, 2020

In a world where children as young as a single day old can fall prey to fraud, it is more...

Read MoreRead more about Child identity theft, part 2: How to reclaim your child’s identity
code
  • News

ESET: hackers used the Adobe brand to attack government websites

March 18, 2020

IT specialists of the Slovak company ESET warn of a new series of attacks committed by the Turla cyber-spy group,...

Read MoreRead more about ESET: hackers used the Adobe brand to attack government websites
gettyimages-642229652
  • News

The Worldwide Pandemic Prompts Technology Giant Samsung to Embrace Electronic Voting

March 18, 2020

There is no denying the fact that the rise of COVID-19 has taken the world by storm yet it’s very...

Read MoreRead more about The Worldwide Pandemic Prompts Technology Giant Samsung to Embrace Electronic Voting
55-1
  • News

Beware of Stalkerware That Has Eyes On All of Your Social Media!

March 18, 2020

Dear social media mongers, amidst all the talk about the Coronavirus and keeping your body’s health in check, your digital...

Read MoreRead more about Beware of Stalkerware That Has Eyes On All of Your Social Media!
osint
  • News

Some useful Cybersecurity tips every Work-from-home Employee must know

March 18, 2020

Amid the Coronavirus (COVID-19) panic, numerous corporates and organizations have told their employees to work from home as a safety...

Read MoreRead more about Some useful Cybersecurity tips every Work-from-home Employee must know
osint
  • News

Stay Wary of Third-Party Apps: Malware App ‘CovidLock’ Locks User Out of their Phone

March 18, 2020

In an attempt to block misinformation from being spread by developers taking advantage of the COVID-19 charged environment, Google started...

Read MoreRead more about Stay Wary of Third-Party Apps: Malware App ‘CovidLock’ Locks User Out of their Phone
lazydocker_1
  • News

Lazydocker – The Lazier Way To Manage Everything Docker

March 18, 2020

A simple terminal UI for both docker and docker-compose, written in Go with the gocui library.Minor rant incoming: Something's not...

Read MoreRead more about Lazydocker – The Lazier Way To Manage Everything Docker
pypykatz_1
  • News

Pypykatz – Mimikatz Implementation In Pure Python

March 18, 2020

Mimikatz implementation in pure Python. At least a part of it :)Runs on all OS's which support python>=3.6 WIKISince version...

Read MoreRead more about Pypykatz – Mimikatz Implementation In Pure Python
measure-success-vulnerability-management-program
  • News

Redefining How to Measure the Success of Your Vulnerability Management Program

March 18, 2020

Could your team be wasting its time reporting vulnerability metrics that don’t matter? Security teams often fall into the trap...

Read MoreRead more about Redefining How to Measure the Success of Your Vulnerability Management Program
osint
  • News

Foreign APT groups use coronavirus phishing lures to drop RAT malware

March 17, 2020

Each day, as the novel coronavirus multiplies and spreads, so do cyber scams capitalizing on users’ fears and thirst for...

Read MoreRead more about Foreign APT groups use coronavirus phishing lures to drop RAT malware
osint
  • News

Password found to rescue victims of malicious COVID-19 tracker app

March 17, 2020

Members of the IT and cybersecurity communities have successfully obtained a password key for victims of CovidLock Android ransomware, which...

Read MoreRead more about Password found to rescue victims of malicious COVID-19 tracker app
osint
  • News

Lock and Code S1Ep2: On the challenges of managed service providers

March 17, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep2: On the challenges of managed service providers
1-1
  • News

APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT

March 17, 2020

Since the coronavirus became a worldwide health issue, the desire for more information and guidance from government and health authorities...

Read MoreRead more about APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT
office-594132_1280
  • News

Cybersecurity experts told how to protect yourself when working from home

March 17, 2020

After the World Health Organization (WHO) officially recognized the outbreak of COVID-2019 as a pandemic, many employers offered their employees...

Read MoreRead more about Cybersecurity experts told how to protect yourself when working from home
osint
  • News

Hackers take advantage of Coronavirus panic, launch Cyberattacks

March 17, 2020

The whole world is in high alert with coronavirus COVID-19, as being declared a pandemic and every government is making...

Read MoreRead more about Hackers take advantage of Coronavirus panic, launch Cyberattacks
abstract-smartphone-camera-990x400-1
  • News

MonitorMinor: vicious stalkerware

March 17, 2020

The other day, our Android traps ensnared an interesting specimen of stalkerware — commercial software that is usually used to...

Read MoreRead more about MonitorMinor: vicious stalkerware
token-reverser
  • News

Token-Reverser – Word List Generator To Crack Security Tokens

March 17, 2020

Word list generator to crack security tokens.Example use case You are testing reset password function Reset password token was sent...

Read MoreRead more about Token-Reverser – Word List Generator To Crack Security Tokens
shuffledns_5_shuffledns-run
  • News

shuffleDNS – Wrapper Around Massdns Written In Go That Allows You To Enumerate Valid Subdomains

March 17, 2020

shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as...

Read MoreRead more about shuffleDNS – Wrapper Around Massdns Written In Go That Allows You To Enumerate Valid Subdomains
multi-layered-approach-security
  • News

How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach

March 17, 2020

Recently, we interviewed Anthony Edwards, director of security operations for Hilltop Holdings, about how his financial holdings organization approaches multi-level...

Read MoreRead more about How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach

Posts pagination

Previous 1 … 4,039 4,040 4,041 4,042 4,043 4,044 4,045 … 4,077 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:2222

May 16, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: olympusaero[.]com

May 16, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: azpiaran[.]com

May 15, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: wnyenergy[.]com

May 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel