Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

RemoteSec: achieving on-prem security levels with cloud-based remote teams

March 13, 2020

The world of work is changing—by the minute, it feels these days. With the onset of the global coronavirus pandemic,...

Read MoreRead more about RemoteSec: achieving on-prem security levels with cloud-based remote teams
laptop2Bhacked
  • News

In Kiev, a hacker group who used the vulnerability of banks to steal their clients’ money was caught

March 13, 2020

The Security Service of Ukraine (SBU) announced the termination of the acclivities of hackers who stole an average of 1.2...

Read MoreRead more about In Kiev, a hacker group who used the vulnerability of banks to steal their clients’ money was caught
abstract-digital-blue-990x400-1
  • News

Cookiethief: a cookie-stealing Trojan for Android

March 13, 2020

We recently discovered a new strain of Android malware. The Trojan (detected as: Trojan-Spy.AndroidOS.Cookiethief) turned out to be quite simple....

Read MoreRead more about Cookiethief: a cookie-stealing Trojan for Android
dirble_1_comparison_graph
  • News

Dirble – Fast Directory Scanning And Scraping Tool

March 13, 2020

Dirble is a website directory scanning tool for Windows and Linux. It's designed to be fast to run and easy...

Read MoreRead more about Dirble – Fast Directory Scanning And Scraping Tool
Pentest-Tools-Framework_10_exploit
  • News

Pentest Tools Framework – A Database Of Exploits, Scanners And Tools For Penetration Testing

March 13, 2020

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes...

Read MoreRead more about Pentest Tools Framework – A Database Of Exploits, Scanners And Tools For Penetration Testing
smb-recent-1
  • News

CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis

March 13, 2020

Rapid7 chief data scientist Bob Rudis, threat intelligence team member Charlie Stafford, and VRM engineering manager Brent Cook also contributed...

Read MoreRead more about CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis
three-3-common-threats-network-data
  • News

3 Common Threats to Look for in Your Network Data

March 13, 2020

Continuously monitoring your network activity for signs of attack is a great way to catch hackers and breaches before they...

Read MoreRead more about 3 Common Threats to Look for in Your Network Data
Vulnerability-1-200x125-1
  • News

OpenSMTPD Vulnerability (CVE-2020-8794) Can Lead to Root Privilege Escalation and Remote Code Execution

March 12, 2020

By Alexander Elkholy (Threats Analyst) A root privilege escalation and remote execution vulnerability (designated as CVE-2020-8794) has been discovered in...

Read MoreRead more about OpenSMTPD Vulnerability (CVE-2020-8794) Can Lead to Root Privilege Escalation and Remote Code Execution
osint
  • News

Malicious coronavirus map hides AZORult info-stealing malware

March 12, 2020

Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples,...

Read MoreRead more about Malicious coronavirus map hides AZORult info-stealing malware
unicorn-300x262-1
  • News

Securing the MSP: best practices for vetting cybersecurity vendors

March 12, 2020

Ironically, to keep costs low for their enterprise and mid-market clients, managed service providers (MSPs) are some of the most...

Read MoreRead more about Securing the MSP: best practices for vetting cybersecurity vendors
hacker2Bidentity2Btheft
  • News

The FBI arrested a Russian associated with Deer.io

March 12, 2020

The Federal Bureau of Investigation arrested a Russian citizen who allegedly supported the sale of hacked accounts and personal data...

Read MoreRead more about The FBI arrested a Russian associated with Deer.io
osint
  • News

Microsoft shuts down World’s Largest Botnet Army

March 12, 2020

According to Microsoft, the company was part of a team that took down the global network of zombie bots. Necurs...

Read MoreRead more about Microsoft shuts down World’s Largest Botnet Army
picture1
  • News

A Module-Based Malware Spread by Word Document

March 12, 2020

As a module-based malware, Trickbot a malware family previously captured by FortiGuard Labs and afterward analyzed in 2016. It can...

Read MoreRead more about A Module-Based Malware Spread by Word Document
arrow-1773951_960_720
  • News

Google Stops Displaying Security Warnings in Microsoft Edge, No Longer Recommends Switching to Chrome

March 12, 2020

Google has stopped advising Microsoft Edge users to switch to Chrome for a more secure experience as the browser extensions...

Read MoreRead more about Google Stops Displaying Security Warnings in Microsoft Edge, No Longer Recommends Switching to Chrome
RedRabbit_1
  • News

RedRabbit – Red Team PowerShell Script

March 12, 2020

RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam To Run: You can either run locally...

Read MoreRead more about RedRabbit – Red Team PowerShell Script
sifter_1_sifter
  • News

Sifter – A OSINT, Recon And Vulnerability Scanner

March 12, 2020

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order...

Read MoreRead more about Sifter – A OSINT, Recon And Vulnerability Scanner
future-infosec-automation-soar-insightconnect-rapid7
  • News

Why Our Future in InfoSec Depends on Automation

March 12, 2020

In a survey conducted by the Ponemon Institute and Domain Tools, 51% of respondents said they believe that automation will...

Read MoreRead more about Why Our Future in InfoSec Depends on Automation
Malware-200x125-1
  • News

Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan

March 11, 2020

By Jaromir Horejsi and Joseph C. Chen (Threat Researchers) We recently discovered a new campaign that we dubbed “Operation Overtrap”...

Read MoreRead more about Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan
Patch-Tuesday-200x125-1
  • News

March Patch Tuesday: LNK, Microsoft Word Vulnerabilities Get Fixes

March 11, 2020

Following the unexpectedly long list of fixes included in last month’s Patch Tuesday, March brings an even longer one, albeit...

Read MoreRead more about March Patch Tuesday: LNK, Microsoft Word Vulnerabilities Get Fixes
osint
  • News

Years-long malware operation hides njRAT in cracked hacking tools

March 11, 2020

Malicious actors have been secretly embedding the njRAT remote access trojan in free hacking tools as well as cracks of those...

Read MoreRead more about Years-long malware operation hides njRAT in cracked hacking tools
2_CF_
  • News

Rocket Loader skimmer impersonates CloudFlare library in clever scheme

March 11, 2020

Update: The digital certificate issued for httpsps has been revoked by GlobalSign. Fraudsters are known for using social engineering tricks...

Read MoreRead more about Rocket Loader skimmer impersonates CloudFlare library in clever scheme
security
  • News

Check Point: coronavirus has become a tool for hacker attacks on users and businesses

March 11, 2020

According to Check Point Threat Intelligence, more than 4,000 coronavirus-related domains have been registered worldwide since January 2020. 3% of...

Read MoreRead more about Check Point: coronavirus has become a tool for hacker attacks on users and businesses
56
  • News

Cisco Vulnerable Again; May Lead To Arbitrary Code Execution!

March 11, 2020

Earlier this year Cisco was in the headlines for the Zero-day vulnerabilities that were discovered in several of its devices...

Read MoreRead more about Cisco Vulnerable Again; May Lead To Arbitrary Code Execution!
cyber2Bcrime
  • News

The United States accused the manager of Group-IB of cybercrime

March 11, 2020

According to an indictment in a court database, US authorities accuse Nikita Kislitsin, manager of a Russian cybersecurity company Group-IB,...

Read MoreRead more about The United States accused the manager of Group-IB of cybercrime

Posts pagination

Previous 1 … 4,041 4,042 4,043 4,044 4,045 4,046 4,047 … 4,077 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

8ea0c1c3766f85ef9a42667473c7341b75e8e0bcb8f2d29ff8bd9901a6fb2738
  • News

Apple Patched One First, But Microsoft’s Blasted Five Exploited Flaws This Pa Tu

May 16, 2025
8aaad9088dc3eaf8223e5a64d4d7f4e9acbbabfc8b18f48210b50353c954d871
  • News

Europe Plots Escape Hatch From The Enshittification Of Search

May 16, 2025
612d01cf80808ec7e8bd885ecb0e54db7acbdfeb7b24621a36174894a8ddc66a
  • News

Here’s What We Know About The Dragonforce Ransomware That Hit Marks & Spencer

May 16, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:2222

May 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel