Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Decentralized Finance (Defi) Protocol Akropolis Hacked For $2 Million In DAI

November 15, 2020

 Decentralized finance (defi) protocol Akropolis was recently hacked for $2 million in DAI, in the most recent flash loan attack...

Read MoreRead more about Decentralized Finance (Defi) Protocol Akropolis Hacked For $2 Million In DAI
herpaderping_1_HerpaderpIcon
  • News

Herpaderping – Process Herpaderping Bypasses Security Products By Obscuring The Intentions Of A Process

November 15, 2020

Process Herpaderping is a method of obscuring the intentions of a process by modifying the content on disk after the...

Read MoreRead more about Herpaderping – Process Herpaderping Bypasses Security Products By Obscuring The Intentions Of A Process
linux-evil-toolkit_1
  • News

Linux-Evil-Toolkit – A Framework That Aims To Centralize, Standardize And Simplify The Use Of Various Security Tools For Pentest Professionals

November 15, 2020

Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for...

Read MoreRead more about Linux-Evil-Toolkit – A Framework That Aims To Centralize, Standardize And Simplify The Use Of Various Security Tools For Pentest Professionals
osint
  • News

Government in Australia issues Clop Ransomware warning to Healthcare Organizations

November 14, 2020

 The Australian Cyber Security Center has issued a security alert for the health sector to check their barriers and defenses...

Read MoreRead more about Government in Australia issues Clop Ransomware warning to Healthcare Organizations
tfsec_1_tfsec
  • News

Tfsec – Security Scanner For Your Terraform Code

November 14, 2020

tfsec uses static analysis of your terraform templates to spot potential security issues. Now with terraform v0.12+ support. Example OutputInstallationInstall...

Read MoreRead more about Tfsec – Security Scanner For Your Terraform Code
scripthunter_1_logo
  • News

Scripthunter – Tool To Find JavaScript Files On Websites

November 14, 2020

Scripthunter is a tool that finds javascript files for a given website. To scan Google, simply run ./scripthunter.sh https://google.com. Note...

Read MoreRead more about Scripthunter – Tool To Find JavaScript Files On Websites
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Home Chef – 8,815,692 breached accounts

November 13, 2020

In early 2020, the food delivery service Home Chef suffered a data breach which was subsequently sold online. The breach...

Read MoreRead more about Home Chef – 8,815,692 breached accounts
Chrome_86_04240_198-600x247-1
  • News

Hat trick for Google as it patches two more zero-days in Chrome

November 13, 2020

Slightly over a week ago we advised you to update your Chrome browser. That warning came only a week or...

Read MoreRead more about Hat trick for Google as it patches two more zero-days in Chrome
osint
  • News

Surviving college distance learning during the pandemic: a cybersecurity guide

November 13, 2020

Social distancing, the wearing of face masks, practicing hand hygiene, and disinfecting often-touched surfaces have become human necessities during the...

Read MoreRead more about Surviving college distance learning during the pandemic: a cybersecurity guide
pasted image 0
  • News

ADHD, what is it? and how does it affect me?

November 13, 2020

(it captures the ADHD experience well) TLDR: Life can be challenging for a person with ADHD; there are hidden struggles...

Read MoreRead more about ADHD, what is it? and how does it affect me?
hash
  • News

Here’s why a Greece Hacker Easily Hacked Croatian University?

November 13, 2020

 A hacker from Greece has published the database of the University of Rijeka in the context of Croatia supporting the...

Read MoreRead more about Here’s why a Greece Hacker Easily Hacked Croatian University?
osint
  • News

Hackers Use Bugs To Attack iOS and Android Devices; Google Doesn’t Disclose Details

November 13, 2020

 Google's cybersecurity team found a cluster of high-end vulnerabilities in iOS, Windows, Android, and Chrome earlier this week. According to...

Read MoreRead more about Hackers Use Bugs To Attack iOS and Android Devices; Google Doesn’t Disclose Details
securelist_spam_2-990x400-1
  • News

Spam and phishing in Q3 2020

November 13, 2020

Quarterly highlights Worming their way in: cybercriminal tricks of the trade These days, many companies distribute marketing newsletters via online...

Read MoreRead more about Spam and phishing in Q3 2020
osint
  • Vulnerabilities

Scope of Debian’s /home/loser is with permissions 755, default umask 002

November 13, 2020

Posted by Georgi Guninski on Nov 12On Debian /home/loser is with permissions 755, default umask 0022 (If you don't understand...

Read MoreRead more about Scope of Debian’s /home/loser is with permissions 755, default umask 002
osint
  • Vulnerabilities

Avian JVM FileOutputStream.write() Integer Overflow

November 13, 2020

Posted by Pietro Oliva via Fulldisclosure on Nov 12Vulnerability title: Avian JVM FileOutputStream.write() Integer Overflow Author: Pietro Oliva Vendor: ReadyTalk...

Read MoreRead more about Avian JVM FileOutputStream.write() Integer Overflow
FAMA_2
  • News

FAMA – Forensic Analysis For Mobile Apps

November 13, 2020

LabCIF - Forensic Analysis for Mobile AppsGetting StartedAndroid extraction and analysis framework with an integrated Autopsy Module. Dump easily user...

Read MoreRead more about FAMA – Forensic Analysis For Mobile Apps
leonidas_1_architecture
  • News

Leonidas – Automated Attack Simulation In The Cloud, Complete With Detection Use Cases

November 13, 2020

Leonidas is a framework for executing attacker actions in the cloud. It provides a YAML-based format for defining cloud attacker...

Read MoreRead more about Leonidas – Automated Attack Simulation In The Cloud, Complete With Detection Use Cases
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Animal Jam – 7,104,998 breached accounts

November 12, 2020

In October 2020, the online game for kids Animal Jam suffered a data breach which was subsequently shared through online...

Read MoreRead more about Animal Jam – 7,104,998 breached accounts
RegretLocker-quarantined
  • News

RegretLocker, new ransomware, can encrypt Windows virtual hard disks

November 12, 2020

Cybersecurity researchers discovered a new ransomware last month called RegretLocker that, despite a no-frills package, can do serious damage to...

Read MoreRead more about RegretLocker, new ransomware, can encrypt Windows virtual hard disks
wallet-3950973_960_720
  • News

Walleon Smart Wallet – where Elegance, Fashion, and Innovation meet

November 12, 2020

With everything evolving around us, technology has reached another great peak when smart wallets came to the market. Being sure,...

Read MoreRead more about Walleon Smart Wallet – where Elegance, Fashion, and Innovation meet
dd00f3d904c02459abc4e6fc2b7984cfcfc4749b
  • News

Czech Republic’s Intelligence Agency Reveal on Russian And Chinese Spies Posing an Imminent Threat to The EU Member’s Security

November 12, 2020

 The Czech Republic's intelligence agency recently revealed that Russian and Chinese spies posed an up and coming threat to the...

Read MoreRead more about Czech Republic’s Intelligence Agency Reveal on Russian And Chinese Spies Posing an Imminent Threat to The EU Member’s Security
startup-3267505_1280
  • News

Interview with Shanmugavel Sankaran, founder of FixNix – The Entrepreneur who sold his house

November 12, 2020

Shanmugavel Sankaran has previously worked with Microsoft and IBM in a variety of information security and compliance management positions. Now...

Read MoreRead more about Interview with Shanmugavel Sankaran, founder of FixNix – The Entrepreneur who sold his house
abstract-blue-digital-man-990x400-1
  • News

Targeted ransomware: it’s not just about encrypting your data!

November 12, 2020

When we talk about ransomware, we need to draw a line between what it used to be and what it...

Read MoreRead more about Targeted ransomware: it’s not just about encrypting your data!
OctopusWAF_1_octopuswaf2
  • News

Octopus WAF – Web Application Firewall Made In C Language And Use Libevent

November 12, 2020

OctopusWAF is a open source Web application firewall, is made in C language uses libevent to make multiple connections. First...

Read MoreRead more about Octopus WAF – Web Application Firewall Made In C Language And Use Libevent

Posts pagination

Previous 1 … 4,065 4,066 4,067 4,068 4,069 4,070 4,071 … 4,174 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-6498

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6497

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6496

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6500

June 25, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-52926

June 25, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel