Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Android2BMalware
  • News

Hackers Attack Amazon Web Services Server

March 6, 2020

A group of sophisticated hackers slammed Amazon Web Services (AWS) servers. The hackers established a rootkit that let them manually...

Read MoreRead more about Hackers Attack Amazon Web Services Server
hacker-2851143_1280
  • News

Information security experts have warned Russians about bonus card fraud schemes.

March 6, 2020

Fraudsters several thousand times tried to illegally take advantage of discount bonuses of Russians in 2019.Some attackers gained access to...

Read MoreRead more about Information security experts have warned Russians about bonus card fraud schemes.
abstract_blur_code-990x400-1
  • News

Mokes and Buerak distributed under the guise of security certificates

March 6, 2020

The technique of distributing malware under the guise of legitimate software updates is not new. As a rule, cybercriminals invite...

Read MoreRead more about Mokes and Buerak distributed under the guise of security certificates
extended-xss-search_2
  • News

Extended-XSS-Search – Scans For Different Types Of XSS On A List Of URLs

March 6, 2020

This is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker...

Read MoreRead more about Extended-XSS-Search – Scans For Different Types Of XSS On A List Of URLs
phonia_1
  • News

Phonia Toolkit – One Of The Most Advanced Toolkits To Scan Phone Numbers Using Only Free Resources

March 6, 2020

Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is...

Read MoreRead more about Phonia Toolkit – One Of The Most Advanced Toolkits To Scan Phone Numbers Using Only Free Resources
Barracuda
  • News

R7-2019-39 | CVE-2019-5648: LDAP Credential Exposure in Barracuda Load Balancer ADC (FIXED)

March 6, 2020

This post describes CVE-2019-5648, a vulnerability in the Barracuda Load Balancer ADC. A malicious actor who gains authenticated, administrative access...

Read MoreRead more about R7-2019-39 | CVE-2019-5648: LDAP Credential Exposure in Barracuda Load Balancer ADC (FIXED)
Mobile-200x125-1
  • News

Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks

March 5, 2020

The Android banking trojan Geost was first revealed in a research by Sebastian García, Maria Jose Erquiaga and Anna Shirokova...

Read MoreRead more about Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks
digital_expert
  • News

Are our police forces equipped to deal with modern cybercrimes?

March 5, 2020

“You should have asked for the presence of a digital detective,” Karen said when I told her what happened at...

Read MoreRead more about Are our police forces equipped to deal with modern cybercrimes?
brighton-station-905615__340
  • News

UK-Based Network Rail Confirms Online Exposure of Wi-Fi User Data

March 5, 2020

The travel details and email addresses of around 10,000 commuters who used free wi-fi provided at UK railway stations were...

Read MoreRead more about UK-Based Network Rail Confirms Online Exposure of Wi-Fi User Data
Privilege2BEscalation
  • News

PrivescCheck – Privilege Escalation Enumeration Script For Windows

March 5, 2020

This script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information...

Read MoreRead more about PrivescCheck – Privilege Escalation Enumeration Script For Windows
TwitWork_2
  • News

TwitWork – Monitor Twitter Stream

March 5, 2020

Monitor twitter stream.TwitWork use the twitter stream which allows you to have a tweets in real-time.There is an input that...

Read MoreRead more about TwitWork – Monitor Twitter Stream
path-oscp-offensive-security-professional-penetration-pen-testing
  • News

Lessons Learned from an Unlikely Path to My OSCP Certification

March 5, 2020

About one year ago, my colleague Trevor O’Donnal wrote a blog post, “Why a 17-Year Veteran Pen Tester Took the...

Read MoreRead more about Lessons Learned from an Unlikely Path to My OSCP Certification
feature_vul-300x300-200x200-1
  • News

Security Risks in Online Coding Platforms

March 4, 2020

By David Fiser (Senior Cyber Threat Researcher) Threat Modeling for Online Coding Platforms Before cloud integrated development environments (IDEs) became...

Read MoreRead more about Security Risks in Online Coding Platforms
osint
  • News

Child identity theft, part 1: On familiar fraud

March 4, 2020

In 2013, 30-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died....

Read MoreRead more about Child identity theft, part 1: On familiar fraud
social-1206612_960_720
  • News

A vulnerability that Allows Hackers to Hijack Facebook Accounts

March 4, 2020

A cybersecurity expert recently found a vulnerability in FB's "login with the Facebook feature." According to the expert, the vulnerability...

Read MoreRead more about A vulnerability that Allows Hackers to Hijack Facebook Accounts
transcribe_console_1
  • News

Amazon Transcribe Can Automatically Shroud the User’s Personal Information from Call Transcripts?

March 4, 2020

Amazon Transcribe, the AWS-based 'speech-to-text service, recently came up with a significant new feature which, if executed effectively, can spontaneously...

Read MoreRead more about Amazon Transcribe Can Automatically Shroud the User’s Personal Information from Call Transcripts?
22-1
  • News

Windows 10 Users Beware! TrickBots’ Prevalence And Conveyance Escalates in Devices

March 4, 2020

Reports mention that recently attackers were found exploiting the latest version of the “Remote Desktop ActiveX” which was developed for...

Read MoreRead more about Windows 10 Users Beware! TrickBots’ Prevalence And Conveyance Escalates in Devices
XCTR-Hacking-Tools_1
  • News

XCTR Hacking Tools – All in one tools for Information Gathering

March 4, 2020

All in one tools for Information Gathering.Instagram: Capture the RootScreenshotsRead MeInitially, you need to create a project where you will...

Read MoreRead more about XCTR Hacking Tools – All in one tools for Information Gathering
wifi-passview_8_screenshot
  • News

WiFi Passview v2.0 – An Open Source Batch Script Based WiFi Passview For Windows!

March 4, 2020

WiFi Passview is an open source batch script based program that can recover your WiFi Password easily in seconds. This...

Read MoreRead more about WiFi Passview v2.0 – An Open Source Batch Script Based WiFi Passview For Windows!
rapid7-quarterly-threat-report-q1-2020
  • News

Rapid7 2020 Threat Report: Exposing Common Attacker Trends

March 4, 2020

If you joined Rapid7 at RSAC 2020 just a few days ago, you probably caught wind of Rapid7’s end-of-year threat...

Read MoreRead more about Rapid7 2020 Threat Report: Exposing Common Attacker Trends
osint
  • News

Data-stealing ransomware hits parts maker for Tesla, Boeing and Lockheed Martin

March 3, 2020

Visser Precision, a parts maker and manufacturing solutions provider for the aerospace, automotive, industrial and manufacturing industries, has reportedly suffered...

Read MoreRead more about Data-stealing ransomware hits parts maker for Tesla, Boeing and Lockheed Martin
osint
  • News

Lock and Code S1Ep1: On RSA, the human element, and the week in security

March 3, 2020

Last week, we told you we were launching a fortnightly podcast, called Lock and Code. This week, we made good...

Read MoreRead more about Lock and Code S1Ep1: On RSA, the human element, and the week in security
credit-card
  • News

The hacker explained why in Russia cards will become more often blocked

March 3, 2020

Hacker Alexander Warski told what to expect from Governing Bodies. According to him, bank cards will more often be blocked...

Read MoreRead more about The hacker explained why in Russia cards will become more often blocked
dnsFookup_1_create
  • News

dnsFookup – DNS Rebinding Toolkit

March 3, 2020

DNS Rebinding freamwork containing:a dns server obviouslyweb api to create new subdomains and control the dns server, view logs, stuff...

Read MoreRead more about dnsFookup – DNS Rebinding Toolkit

Posts pagination

Previous 1 … 4,043 4,044 4,045 4,046 4,047 4,048 4,049 … 4,077 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: azpiaran[.]com

May 15, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: wnyenergy[.]com

May 15, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: ITinSell group

May 15, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Vezina Lawrence & Piscitelli

May 15, 2025
image
  • Data Breach
  • Ransomware

[STORMOUS] – Ransomware Victim: www[.]jparkislandresort[.]com

May 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel