Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Botnet
  • News

Well thanks anna-senpai for the Mirai source code release

October 28, 2016

Yeah, thanks a lot.... in-case you can't tell its my sarcasm kicking in. After doing heavy damage to KrebsOnSecurity and...

Read MoreRead more about Well thanks anna-senpai for the Mirai source code release
capture
  • News

Testing for the dirty cow CVE-2016-5195?

October 21, 2016

On october 19 2016, the Dirty Cow vulnerability went public (which is kernel privilege escalation vulnerability) . From what I...

Read MoreRead more about Testing for the dirty cow CVE-2016-5195?
linux-server
  • News

Potential Ransomware Hits Linux Servers

August 31, 2016

Linux running web servers appear to be at risk of a new strain of ransomware called FairWare. Three Linux administrators,...

Read MoreRead more about Potential Ransomware Hits Linux Servers
Botnet
  • News

Kelihos Botnet now dishing out Ransomware

August 30, 2016

Kelihos is one of the oldest botnets, first spotted way back in 2008, but it has managed to survive a...

Read MoreRead more about Kelihos Botnet now dishing out Ransomware
Selection_009
  • News

NSA potentially hacked by The Shadow Brokers

August 15, 2016

It seems that the NSA has been hacked. This is being speculated after a group of hackers going by the...

Read MoreRead more about NSA potentially hacked by The Shadow Brokers
bbc
  • News

BBC sniffing Wi-Fi packets to detect BBC iPlayer users without TV Licence.

August 8, 2016

From September 1, you'll need a TV licence if you stream catch-up or on-demand TV from the BBC's iPlayer service, regardless...

Read MoreRead more about BBC sniffing Wi-Fi packets to detect BBC iPlayer users without TV Licence.
Zero Days
  • News

Stuxnet : Operation Olympic Games NSA Codename

July 11, 2016

Everyone knows about the joint USA and Israeli malware called Stuxnet that was designed to put a halt to the...

Read MoreRead more about Stuxnet : Operation Olympic Games NSA Codename
adobe-hack
  • News

Adobe Flash zero-day actively exploited in targeted attacks

June 15, 2016

A zero-day vulnerability affecting the latest version of Adobe Flash Player and all previous ones is being actively exploited in...

Read MoreRead more about Adobe Flash zero-day actively exploited in targeted attacks
guccifer-hillary
  • News

Hacker ‘Guccifer’: I Got Inside Hillary Clinton’s Server

June 11, 2016

The Romanian hacker who first exposed Hillary Clinton's private email address is making a bombshell new claim — that he...

Read MoreRead more about Hacker ‘Guccifer’: I Got Inside Hillary Clinton’s Server
Selection_036
  • Tutorials

Facebook Chess

June 11, 2016

Well, not really a security related post but just found out that you can play chess in Facebook Messenger.. Like...

Read MoreRead more about Facebook Chess
firewall
  • News

Are we surpirsed that Millions of ‘must be firewalled’ services are open to the entire internet

June 9, 2016

Millions of services that ought to be restricted are exposed on the open internet, creating a huge risk of hacker...

Read MoreRead more about Are we surpirsed that Millions of ‘must be firewalled’ services are open to the entire internet
teamviewer
  • News

Team viewer to beef up security after “hacks” and DDoS

June 9, 2016

TeamViewer has announced two new features today aimed at boosting the app's security after the company's reputation was smirched this...

Read MoreRead more about Team viewer to beef up security after “hacks” and DDoS
LetsEncrypt
  • Tutorials

How to use Lets Encrypt on Go Daddy’s Shared Hosting Platform

June 8, 2016

So your looking for a way to use a free lets encrypt cert on your shared godaddy host? Well this...

Read MoreRead more about How to use Lets Encrypt on Go Daddy’s Shared Hosting Platform
keyboard
  • News

OEM Laptops Bloatware allows Remote Code Execution

May 31, 2016

Laptops from Dell, HP, Asus, Acer and Lenovo all had at least one vulnerability that could result in complete compromise...

Read MoreRead more about OEM Laptops Bloatware allows Remote Code Execution
Selection_028
  • News

Have I been Pwned release more updates

May 31, 2016

As you all know, there have been many many many data breach's lately, you know LinkedIn again recently admitted to...

Read MoreRead more about Have I been Pwned release more updates
Selection_010
  • Tutorials

Using airodump-ng WiFi

May 22, 2016

Now many of you that are reading this are fully aware of the wireless hacking arena. So i'm not going...

Read MoreRead more about Using airodump-ng WiFi
Fisher
  • News

Phineas Fisher records and publishes latest attack

May 20, 2016

Phineas Fisher, the hacker that was behind the Hacking Team and the Gamma International breaches and data leaks, is at it again....

Read MoreRead more about Phineas Fisher records and publishes latest attack
teslacrypt-closed
  • News

TeslaCrypt shuts down and Releases Master Decryption Key

May 19, 2016

In surprising end to TeslaCrypt, the developers shut down their ransomware and released the master decryption key. Over the past few weeks,...

Read MoreRead more about TeslaCrypt shuts down and Releases Master Decryption Key
Settings Menu
  • Tutorials

LinkedIn hack : Enable 2FA

May 18, 2016

Remember the LinkedIn hack of 2o12? with around 6.5 million password leaked? Well apparently that wasn't all of it. New...

Read MoreRead more about LinkedIn hack : Enable 2FA
SpiderFoot
  • Tutorials

SpiderFoot v2.7 – OSINT

May 16, 2016

SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a...

Read MoreRead more about SpiderFoot v2.7 – OSINT
FBI-Cellebrite
  • News

FBI crack the iPhone with external help from Cellebrite

March 29, 2016

The FBI has managed to unlock the iPhone of the San Bernardino gunman without Apple's help, ending a court case,...

Read MoreRead more about FBI crack the iPhone with external help from Cellebrite
hacker
  • News

LA Hospital Pays Ransomware

February 20, 2016

A large Los Angeles hospital chose to pay hackers who were holding its computer network hostage, a move its CEO said...

Read MoreRead more about LA Hospital Pays Ransomware
Netgear_logo_2014.svg
  • News
  • Tutorials

Netgear GS108Tv2 Information Disclosure Vulnerability

February 10, 2016

I have recently found a vulnerability on my Netgear Managed Switch I use at home. Its an information disclosure vulnerability....

Read MoreRead more about Netgear GS108Tv2 Information Disclosure Vulnerability
LastPass-ProtonMail
  • Tutorials

How to use LastPass and ProtonMail with 2 passwords

February 3, 2016

LastPass and ProtonMail how to guide If your like me, you have many many many password to keep track of....

Read MoreRead more about How to use LastPass and ProtonMail with 2 passwords

Posts pagination

Previous 1 … 4,063 4,064 4,065 4,066 4,067 4,068 4,069 4,070 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]219[.]163[.]113:443

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]120[.]45[.]216:9009

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]156[.]57[.]179:80

May 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel