Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
2019-02-26_14-08
  • News

Malware Triggers in Outlook Preview Without User Opening Word Document

February 26, 2019

A recent malware sample forwarded to our Threat Intelligence service had some very interesting properties which we think would be useful to...

Read MoreRead more about Malware Triggers in Outlook Preview Without User Opening Word Document
mozilla
  • News

Mozilla fears encryption law could turn its employees into insider threats

February 26, 2019

Mozilla has told the Australian government that its anti-encryption laws could turn its own employees into insider threats.The Mozilla Corporation,...

Read MoreRead more about Mozilla fears encryption law could turn its employees into insider threats
linkedin
  • News

Hackers abuse LinkedIn DMs to plant malware

February 26, 2019

Hackers are impersonating recruitment agencies on LinkedIn in a bid to target companies with backdoor malware. Researchers at Proofpoint found...

Read MoreRead more about Hackers abuse LinkedIn DMs to plant malware
marionet
  • News

New browser based attack called MarioNet

February 26, 2019

Academics from Greece have devised a new browser-based attack that can allow hackers to run malicious code inside users' browsers...

Read MoreRead more about New browser based attack called MarioNet
hacker
  • News

Cyber criminals promise millions to skilled professionals

February 26, 2019

Cyber criminals are willing to pay more than a million dollars a year to skilled information security professionals who are willing to...

Read MoreRead more about Cyber criminals promise millions to skilled professionals
CMS
  • News

New Malspam Campaign Targets WinRAR ACE Flaw to Deliver Malware

February 26, 2019

Security researchers have discovered a new Malspam campaign exploiting the recently discovered WinRAR ACE flaw to install malware on the...

Read MoreRead more about New Malspam Campaign Targets WinRAR ACE Flaw to Deliver Malware
alert-banner
  • News

Multiple ArtraDownloader Variants Used by BITTER to Target Pakistan

February 26, 2019

Executive Summary Since at least 2015, a suspected South Asian threat grouping known as BITTER has been targeting Pakistan and Chinese organizations...

Read MoreRead more about Multiple ArtraDownloader Variants Used by BITTER to Target Pakistan
code-707069_1280
  • News

Russian hacker accused of bank cyber-attacks pleads guilty in US court

February 25, 2019

Russian programmer Stanislav Lisov, extradited to the United States from Spain in 2018, pleaded guilty to conspiring to commit a...

Read MoreRead more about Russian hacker accused of bank cyber-attacks pleads guilty in US court
Marriott_hotels_logo14.svg
  • News

Marriott Reveals They Had My Un-encrypted Passport and Credit Card Information, and Now Hackers Have It

February 25, 2019

Marriott let me know that the hack of their systems released my unencrypted passport number and unencrypted credit card number....

Read MoreRead more about Marriott Reveals They Had My Un-encrypted Passport and Credit Card Information, and Now Hackers Have It
nk
  • News

North Korean hackers could start stealing business secrets

February 22, 2019

As North Korea tries to rev up its economy, it may shift its hacking efforts from financial thievery to stealing...

Read MoreRead more about North Korean hackers could start stealing business secrets
visa
  • News

Secret Rules of Visa and MasterCard Revealed by Russian Ex-Hacker

February 21, 2019

Dmitry Artimovich, who on several occasions had been referred to as a "Russian hacker” by the world's largest news publications...

Read MoreRead more about Secret Rules of Visa and MasterCard Revealed by Russian Ex-Hacker
dirtysock
  • News

dirty_sock: Linux Privilege Escalation (via snapd)

February 21, 2019

In January 2019, current versions of Ubuntu Linux were found to be vulnerable to local privilege escalation due to a...

Read MoreRead more about dirty_sock: Linux Privilege Escalation (via snapd)
drupal
  • News

CVE-2019-6340 | Drupal RCE Vulnerability

February 21, 2019

The remote execution flaw exists because some field types do not properly sanitize data from non-form sources and this can...

Read MoreRead more about CVE-2019-6340 | Drupal RCE Vulnerability
linux
  • News

CVE-2019-8912 | Use After Free Arbitrary Code Execution Vulnerability for many Linux Kernels

February 21, 2019

Linux Kernel is prone to an arbitrary code-execution vulnerability.An attacker can exploit this issue to execute arbitrary code in the...

Read MoreRead more about CVE-2019-8912 | Use After Free Arbitrary Code Execution Vulnerability for many Linux Kernels
hacker
  • News

Cybersecurity A Key Challenge for the Automotive Industry

February 21, 2019

The fundamental challenge of cybersecurity is not new. They have existed as long as computers have been used in sensitive applications in...

Read MoreRead more about Cybersecurity A Key Challenge for the Automotive Industry
sys
  • News

Monero Miner-Malware Uses RADMIN, MIMIKATZ to Infect, Propagate via SMB Vulnerability

February 20, 2019

Between the last week of January to February, we noticed an increase in hack tool installation attempts that dropped seemingly...

Read MoreRead more about Monero Miner-Malware Uses RADMIN, MIMIKATZ to Infect, Propagate via SMB Vulnerability
2019-02-20_08-11
  • News

GitHub Increases Bug Bounty Program Rewards

February 20, 2019

GitHub revealed on Tuesday that last year it paid out $165,000 to researchers who took part in its public bug...

Read MoreRead more about GitHub Increases Bug Bounty Program Rewards
kali-release
  • News

Kali Linux 2019.1 – Updates…updates….updates

February 19, 2019

Everyone likes a new Kali update!The big marquee update of this release is the update of Metasploit to version 5.0,...

Read MoreRead more about Kali Linux 2019.1 – Updates…updates….updates
crowdstrike-rankings
  • News

You have around 20 minutes to contain a Russian APT attack

February 19, 2019

Governments and private organisations have around 20 minutes to detect and contain a hack from Russian nation-state actors. New statistics...

Read MoreRead more about You have around 20 minutes to contain a Russian APT attack
2018-10-10 08_37_11-Adversary Simulation and Red Team Operations Software - Cobalt Strike
  • Tutorials

Cobalt Strike

October 10, 2018

Cobalt Strike is  software for Adversary Simulations and Red Team Operations. What this means is, if you wanted to test your...

Read MoreRead more about Cobalt Strike
Selection_012
  • Tutorials

Canary Tokens

October 9, 2018

TLDR: Canary tokens are not new but can help give you some Intel into your attackers, be it insider or...

Read MoreRead more about Canary Tokens
Selection_010
  • Tutorials

Kali Linux 2018.3 Increase TxPower

May 16, 2018

Increasing the TXpower above what is allowed in your country can be illegal. If you decide to make these changes...

Read MoreRead more about Kali Linux 2018.3 Increase TxPower
2018-04-24 21_32_56-
  • Tutorials

How to setup your Libre Elec / Kodi / Google Home Bluetooth / Yatse Android Remote

April 24, 2018

I have a number of Kodi Media Centre running in different rooms around the house. Some are hooked up to...

Read MoreRead more about How to setup your Libre Elec / Kodi / Google Home Bluetooth / Yatse Android Remote
oscp-certs
  • Tutorials

Another, Here is my OSCP story

April 15, 2018

So the OSCP journey is hard work, needs commitment, understanding from your wife and a try harder attitude (you will...

Read MoreRead more about Another, Here is my OSCP story

Posts pagination

Previous 1 … 4,061 4,062 4,063 4,064 4,065 4,066 4,067 … 4,070 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]219[.]163[.]113:443

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]120[.]45[.]216:9009

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]156[.]57[.]179:80

May 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel