Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
hetty_5
  • News

Hetty – An HTTP Toolkit For Security Research

November 9, 2020

Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like...

Read MoreRead more about Hetty – An HTTP Toolkit For Security Research
camera-1219748_1280
  • News

Russian expert told how to figure out surveillance via a webcam

November 8, 2020

 It is becoming more and more difficult to find out whether you are being followed through a webcam. According to...

Read MoreRead more about Russian expert told how to figure out surveillance via a webcam
jsmon_1_telegram
  • News

JSMon – JavaScript Change Monitor for BugBounty

November 8, 2020

Using this script, you can configure a number of JavaScript files on websites that you want to monitor. Everytime you...

Read MoreRead more about JSMon – JavaScript Change Monitor for BugBounty
Threagile
  • News

Threagile – Agile Threat Modeling Toolkit

November 8, 2020

Threagile (see https://threagile.io for more details) is an open-source toolkit for agile threat modeling: It allows to model an architecture...

Read MoreRead more about Threagile – Agile Threat Modeling Toolkit
osint
  • News

Update your iOS now! Apple patches three zero-day vulnerabilities

November 7, 2020

Apple has patched three vulnerabilities in iOS (and iPadOS) that were actively being exploited in targeted attacks. Vulnerabilities that are...

Read MoreRead more about Update your iOS now! Apple patches three zero-day vulnerabilities
osint
  • News

RegTech explained: a crucial toolset for the financial industry

November 7, 2020

Every organization in the financial industry needs to meet certain regulatory obligations, even if it’s just filing a tax return...

Read MoreRead more about RegTech explained: a crucial toolset for the financial industry
phone-869669_1280
  • News

The Russian expert point out which smartphones are most vulnerable to surveillance

November 7, 2020

According to Anton Averin, Deputy Director of the Institute of Information Technologies of the Synergy University, if you wish and...

Read MoreRead more about The Russian expert point out which smartphones are most vulnerable to surveillance
abstract-digital-lock-990x400-1
  • News

RansomEXX Trojan attacks Linux systems

November 7, 2020

We recently discovered a new file-encrypting Trojan built as an ELF executable and intended to encrypt data on machines controlled...

Read MoreRead more about RansomEXX Trojan attacks Linux systems
GWT-load-fragment
  • News

GWTMap – Tool to help map the attack surface of Google Web Toolkit

November 7, 2020

GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications. The purpose of...

Read MoreRead more about GWTMap – Tool to help map the attack surface of Google Web Toolkit
osint
  • Vulnerabilities

secuvera-SA-2020-01: Broken Object Level Authorization Vulnerability in OvulaRing-Webapplication

November 7, 2020

Posted by Tobias Glemser on Nov 06secuvera-SA-2020-01: Broken Object Level Authorization Vulnerability in OvulaRing-Webapplication Affected Products OvulaRing Webapp Version 4.2.2...

Read MoreRead more about secuvera-SA-2020-01: Broken Object Level Authorization Vulnerability in OvulaRing-Webapplication
osint
  • Vulnerabilities

Advisory: ES2020-02 – Asterisk crash due to INVITE flood over TCP

November 7, 2020

Posted by Sandro Gauci on Nov 06# Asterisk crash due to INVITE flood over TCP - Fixed versions: 13.37.1, 16.14.1,...

Read MoreRead more about Advisory: ES2020-02 – Asterisk crash due to INVITE flood over TCP
osint
  • Vulnerabilities

APPLE-SA-2020-11-05-7 tvOS 14.2

November 7, 2020

Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-7 tvOS 14.2 tvOS 14.2 is now available and address the...

Read MoreRead more about APPLE-SA-2020-11-05-7 tvOS 14.2
osint
  • Vulnerabilities

APPLE-SA-2020-11-05-1 iOS 14.2 and iPadOS 14.2

November 7, 2020

Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-1 iOS 14.2 and iPadOS 14.2 iOS 14.2 and iPadOS 14.2...

Read MoreRead more about APPLE-SA-2020-11-05-1 iOS 14.2 and iPadOS 14.2
osint
  • Vulnerabilities

APPLE-SA-2020-11-05-2 iOS 12.4.9

November 7, 2020

Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-2 iOS 12.4.9 iOS 12.4.9 is now available and address the...

Read MoreRead more about APPLE-SA-2020-11-05-2 iOS 12.4.9
giphy
  • News

Tempomail – Generate A Custom Email Address In 1 Second And Receive Emails

November 6, 2020

tempomail is a standalone binary that allows you to create a temporary email address in 1 Second and receive emails....

Read MoreRead more about Tempomail – Generate A Custom Email Address In 1 Second And Receive Emails
osint
  • News

QBot malspam campaign preys on Americans anticipation for election news

November 6, 2020

An intense presidential election and a grueling week of vote counting has left many Americans distracted from their work, anxious...

Read MoreRead more about QBot malspam campaign preys on Americans anticipation for election news
osint
  • News

Prop 24 passes in California, will change data privacy law

November 6, 2020

First-day returns in California showed voters firmly approving to change their state’s current data privacy law—which already guarantees certain privacy...

Read MoreRead more about Prop 24 passes in California, will change data privacy law
osint
  • News

Google Chrome Receives Second Patch for Serious Zero-Day Bug in Two Weeks

November 6, 2020

 Google has recently introduced a fix for another zero-day bug in its Chrome browser and has also released a new...

Read MoreRead more about Google Chrome Receives Second Patch for Serious Zero-Day Bug in Two Weeks
online-shop-2300686_1280
  • News

The Russian Duma has introduced a bill to strengthen control over foreign e-wallets

November 6, 2020

The document obliges citizens to report to the Federal Tax Service on the movement of funds in their foreign electronic...

Read MoreRead more about The Russian Duma has introduced a bill to strengthen control over foreign e-wallets
cyber-security-1805632_960_720
  • News

Latest in CyberSecurity today : Maze Ransomware call it quits

November 6, 2020

 The operators of the infamous Maze Ransomware has said a bitter (for some a very sweet) goodbye. Maze Ransomware incepted...

Read MoreRead more about Latest in CyberSecurity today : Maze Ransomware call it quits
abstract-secure-990x400-1
  • News

Attacks on industrial enterprises using RMS and TeamViewer: new data

November 6, 2020

 Download full report (PDF) Executive Summary In summer 2019, Kaspersky ICS CERT identified a new wave of phishing emails containing...

Read MoreRead more about Attacks on industrial enterprises using RMS and TeamViewer: new data
kraken_1_kraken
  • News

Kraken – Cross-platform Yara Scanner Written In Go

November 6, 2020

Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily...

Read MoreRead more about Kraken – Cross-platform Yara Scanner Written In Go
SwiftyInsta
  • News

SwiftyInsta – Instagram Unofficial Private API Swift

November 6, 2020

Instagram offers two kinds of APIs to developers. The Instagram API Platform (extremely limited in functionality and close to being...

Read MoreRead more about SwiftyInsta – Instagram Unofficial Private API Swift
osint
  • Vulnerabilities

AST-2020-002: Outbound INVITE loop on challenge with different nonce.

November 6, 2020

Posted by Asterisk Security Team on Nov 05 Asterisk Project Security Advisory – AST-2020-002 Product Asterisk Summary Outbound INVITE loop...

Read MoreRead more about AST-2020-002: Outbound INVITE loop on challenge with different nonce.

Posts pagination

Previous 1 … 4,066 4,067 4,068 4,069 4,070 4,071 4,072 … 4,173 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: www[.]covenanthealth[.]net

June 24, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: lurie-glass

June 24, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: motorsport-de-la-capitale

June 24, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6512

June 24, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-52877

June 24, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel