Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for Robust Cyber Defense

June 25, 2025
unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Packer-Fuzzer_6_demo-terminal
  • News

Packer-Fuzzer – A Fast And Efficient Scanner For Security Detection Of Websites Constructed By Javascript Module Bundler Such As Webpack

December 9, 2020

With the popularity of web front-end packaging tools, have you encountered more and more websites represented by Webpack packager in...

Read MoreRead more about Packer-Fuzzer – A Fast And Efficient Scanner For Security Detection Of Websites Constructed By Javascript Module Bundler Such As Webpack
wp
  • News

Wp_Hunter – Static Analysis Of WordPress Plugins

December 9, 2020

Static analysis to search for vulnerabilities in Wordpress plugins. __ ____________ ___ ___ __ / / ______ / | __...

Read MoreRead more about Wp_Hunter – Static Analysis Of WordPress Plugins
patches-2
  • News

Patch Tuesday – December 2020

December 9, 2020

We close off our 2020 year of Patch Tuesdays with 58 vulnerabilities being addressed. While it's a higher count than...

Read MoreRead more about Patch Tuesday – December 2020
2020-Under-the-Hoodie-Report-Reveals-Pen-Testers-Most-Loved-Vulnerabilities
  • News

2020 Under the Hoodie Report Reveals Pen Testers’ Most-Loved Vulnerabilities

December 9, 2020

Penetration testing (“pentesting”) is the practice of simulating a criminal breach of a sensitive area in order to uncover and...

Read MoreRead more about 2020 Under the Hoodie Report Reveals Pen Testers’ Most-Loved Vulnerabilities
osint
  • Vulnerabilities

Re: Disable Windows Defender and most other 3rd party antiviruses

December 8, 2020

Posted by Exibar on Dec 08Would this not be the same as uninstalling the AV application in safemode? -----Original Message-----...

Read MoreRead more about Re: Disable Windows Defender and most other 3rd party antiviruses
osint
  • News

Russian Alexander Vinnik sentenced in Paris to five years in prison for money laundering

December 8, 2020

Russian citizen Alexander Vinnik was sentenced in Paris to five years in prison for money laundering and ordered to pay 100,000...

Read MoreRead more about Russian Alexander Vinnik sentenced in Paris to five years in prison for money laundering
osint
  • News

Expert discloses zero-click, wormable flaw in Microsoft Teams

December 8, 2020

Security expert disclosed technical details about a wormable, cross-platform flaw in Microsoft Teams that could allow stealth attacks. Security researcher...

Read MoreRead more about Expert discloses zero-click, wormable flaw in Microsoft Teams
osint
  • News

Critical remote code execution fixed in PlayStation Now

December 8, 2020

Security flaws in the PlayStation Now cloud gaming Windows application allowed hackers to execute arbitrary code on Windows systems. Bug bounty...

Read MoreRead more about Critical remote code execution fixed in PlayStation Now
osint
  • News

QNAP fixed eight flaws that could allow NAS devices takeover

December 8, 2020

Network-attached storage (NAS) vendor QNAP addressed vulnerabilities that could enable attackers to take over unpatched NAS devices. The Taiwanese vendor...

Read MoreRead more about QNAP fixed eight flaws that could allow NAS devices takeover
osint
  • News

DoppelPaymer ransomware gang hit Foxconn electronics giant

December 8, 2020

Electronics contract manufacturer Foxconn is the last victim of the DoppelPaymer ransomware operators that hit a Mexican facility. DoppelPaymer ransomware operators...

Read MoreRead more about DoppelPaymer ransomware gang hit Foxconn electronics giant
osint
  • News

Cisco fixes exploitable RCEs in Cisco Security Manager

December 8, 2020

Cisco released security updates to fix multiple pre-authentication RCE flaws with public exploits affecting Cisco Security Manager. Cisco has released security updates...

Read MoreRead more about Cisco fixes exploitable RCEs in Cisco Security Manager
osint
  • News

Lock and Code S1Ep21: Lesson planning your school’s cybersecurity with Doug Levin

December 8, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep21: Lesson planning your school’s cybersecurity with Doug Levin
osint
  • News

50 percent of schools did not prepare for secure distance learning, Labs report reveals

December 8, 2020

Education in the United States faced a crisis this year. The looming threat of the coronavirus—which spreads easily in highly-populated,...

Read MoreRead more about 50 percent of schools did not prepare for secure distance learning, Labs report reveals
abstract-blue-990x400-1
  • News

Researchers call for a determined path to cybersecurity

December 8, 2020

Despite our continuous research efforts to detect cyberattacks and enable defense, we often feel that we, as members of a...

Read MoreRead more about Researchers call for a determined path to cybersecurity
osint
  • Vulnerabilities

Disable Windows Defender and most other 3rd party antiviruses

December 8, 2020

Posted by Roberto Franceschetti on Dec 07Windows Defender and most other antivirus applications can be disabled by booting into safe...

Read MoreRead more about Disable Windows Defender and most other 3rd party antiviruses
osint
  • Vulnerabilities

Request for full disclosure of CVE-2020-25889 & CVE-2020-25955

December 8, 2020

Posted by krishna yadav on Dec 07Dear Team, Please find attached POC and detailed information for CVE-2020-25889 & CVE-2020-25955. For...

Read MoreRead more about Request for full disclosure of CVE-2020-25889 & CVE-2020-25955
Baphomet
  • News

Baphomet – Basic Concept Of How A Ransomware Works

December 8, 2020

This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack...

Read MoreRead more about Baphomet – Basic Concept Of How A Ransomware Works
javascript
  • News

Js-X-Ray – JavaScript And Node.js Open-Source SAST Scanner (A Static Analysis Of Detecting Most Common Malicious Patterns)

December 8, 2020

JavaScript AST analysis. This package has been created to export the Node-Secure AST Analysis to enable better code evolution and...

Read MoreRead more about Js-X-Ray – JavaScript And Node.js Open-Source SAST Scanner (A Static Analysis Of Detecting Most Common Malicious Patterns)
top_10-1
  • News

Congrats to the winners of the 2020 December Metasploit community CTF

December 8, 2020

Thank you all that participated in the 2020 December Metasploit community CTF! The four day CTF was well received by...

Read MoreRead more about Congrats to the winners of the 2020 December Metasploit community CTF
NICER-Protocol-Deep-Dive-Internet-Exposure-of-memcached2
  • News

NICER Protocol Deep Dive: Internet Exposure of memcached

December 8, 2020

Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...

Read MoreRead more about NICER Protocol Deep Dive: Internet Exposure of memcached
image-1
  • Tutorials

Adding Telegram notification to Synology NAS Watchtower

December 7, 2020

I am going to assume you have already got your NAS working, with a working install of WatchTower.Once that is...

Read MoreRead more about Adding Telegram notification to Synology NAS Watchtower
osint
  • News

Russia-linked hackers actively exploit CVE-2020-4006 VMware flaw, NSA warns

December 7, 2020

The National Security Agency (NSA) warns that Russia-linked hackers are exploiting a recently patched VMware flaw in a cyberespionage campaign. The...

Read MoreRead more about Russia-linked hackers actively exploit CVE-2020-4006 VMware flaw, NSA warns
osint
  • News

US Cyber Command and Australian IWD to develop shared cyber training range

December 7, 2020

US Cyber Command and the Information Warfare Division (IWD) of the Australian Defense Force to develop a virtual cyber training...

Read MoreRead more about US Cyber Command and Australian IWD to develop shared cyber training range
osint
  • News

LockBit Ransomware operators hit Swiss helicopter maker Kopter

December 7, 2020

LockBit ransomware operators have compromised the systems at the helicopter maker Kopter and published them on their darkweb leak site....

Read MoreRead more about LockBit Ransomware operators hit Swiss helicopter maker Kopter

Posts pagination

Previous 1 … 4,057 4,058 4,059 4,060 4,061 4,062 4,063 … 4,175 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Cutcliffe Archetto & Santilli

June 25, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Tecore

June 25, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: gudeco[.]de

June 25, 2025
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: Medical Center of Marin

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-44531

June 25, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel