Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
java-logo-100027745-large
  • News

Oracle to Kill Java Browser Plugin

January 28, 2016

Oracle on Wednesday announced specific plans to kill the Java browser plugin and has advised users to start migrating to...

Read MoreRead more about Oracle to Kill Java Browser Plugin
LG-LOGO
  • News

LG Patches Severe Smartphone Hijack Vulnerability

January 28, 2016

LG today released a security update for some of its latest smartphones to resolve a severe vulnerability found in the...

Read MoreRead more about LG Patches Severe Smartphone Hijack Vulnerability
kali-rolling-screenshot
  • News

Kali Linux – Rolling Edition Released

January 24, 2016

Welcome back to the RedPacket Security website. An important milestone for Offensive Security has come with the first public release of...

Read MoreRead more about Kali Linux – Rolling Edition Released
GoPhish9
  • Tutorials

GoPhish! – Install tutorial for InfoSec people to train staff on phishing

January 22, 2016

So I have fired up a VM of Ubuntu and typed the following I soon found out that on a vanilla...

Read MoreRead more about GoPhish! – Install tutorial for InfoSec people to train staff on phishing
GCHQ at Cheltenham, Gloucestershire
  • News

GCHQ have designed built-in backdoors to allow snooping

January 22, 2016

An aerial image of the Government Communications Headquarters (GCHQ) in Cheltenham, Gloucestershire. GCHQ is one of the three UK Intelligence...

Read MoreRead more about GCHQ have designed built-in backdoors to allow snooping
SSH Kippo Honeypot
  • Tutorials

Kippo Honeypot Attack – Linux XorDDOS malware

January 6, 2016

So I have had my kippo honeypot running for a while and got some pretty good statistics from it. But...

Read MoreRead more about Kippo Honeypot Attack – Linux XorDDOS malware
Invite-Beta
  • News

Review of Beta ProtonMail Android App

November 11, 2015

            So we have all heard about the recent DDoS attack on ProtonMail over the...

Read MoreRead more about Review of Beta ProtonMail Android App
protonemaillogo
  • News

ProtonMail targeted by a large DDoS attack

November 6, 2015

ProtonMail, the secure encrypted email service in Switzerland have been having  bad time recently. ProtonMail, an encrypted email provider, has...

Read MoreRead more about ProtonMail targeted by a large DDoS attack
talk-talk-logo-_1361791a
  • News

TalkTalk hack affected far fewer customers than first thought

November 6, 2015

In total 4% of the customer base had personal data compromised.   The cyber-attack on TalkTalk was successful on a...

Read MoreRead more about TalkTalk hack affected far fewer customers than first thought
exercise-
  • News

Fitbit trackers can be hacked in ’10 seconds’

October 25, 2015

So it seems there is a Fitbit vulnerability involving the BlueTooth implementation that can be used to embed self replicating...

Read MoreRead more about Fitbit trackers can be hacked in ’10 seconds’
cyber-attack-methods-embedded-in-code-dreamstime_xl_10631354
  • News

MOKER: A new APT undetected by VirusTotal

October 8, 2015

Recently, enSilo found an Advanced Persistent Threat (APT) residing in a sensitive network of a customer. This APT appears to...

Read MoreRead more about MOKER: A new APT undetected by VirusTotal
owa-header-664x374
  • News

Hackers Breach Microsoft OWA Server, Steal 11,000 User Passwords

October 6, 2015

A malicious DLL was able to read & log passwords in clear text An attack exploiting the Microsoft Outlook Web...

Read MoreRead more about Hackers Breach Microsoft OWA Server, Steal 11,000 User Passwords
anonymous
  • News

Linux.Wifatch ‘malware’ may be patching up security flaws

October 2, 2015

SYMANTEC is reporting about Linux.Wifatch They are suggesting that it might be a good guy type of internet threat that wants to...

Read MoreRead more about Linux.Wifatch ‘malware’ may be patching up security flaws
botnet
  • News

Linux botnet is launching crippling DDoS attacks at more than 150Gbps

September 30, 2015

The XOR DDoS botnet can generate attacks more powerful than most businesses can withstand A Linux botnet has grown so powerful...

Read MoreRead more about Linux botnet is launching crippling DDoS attacks at more than 150Gbps
honeypot
  • News

Problems I have found with Kippo Honeypot

September 14, 2015

Kippo! Great honeypot..... But there are problems, i mean 2 seconds with metasploit and BAM! honeypot detected! Then there are...

Read MoreRead more about Problems I have found with Kippo Honeypot
twitterissue
  • News

Twitter is having problems

September 14, 2015

This is just an update for anyone else wondering. There seems to be issues with twitter.com But it seems the...

Read MoreRead more about Twitter is having problems
Type_in_the_Network_Label.jpg
  • Tutorials

Setting Up A DMZ on ESXi 5.5, with PfSense ready for a honeypot

September 11, 2015

So I have recently setup a kippo honeypot, let me show you how I setup my DMZ ready for the...

Read MoreRead more about Setting Up A DMZ on ESXi 5.5, with PfSense ready for a honeypot
3d-firefox
  • Tutorials

3d Mode in Firefox

September 8, 2015

Wow, did you know there was a 3D mode in Firefox ? You did? Ah well I didn't know until...

Read MoreRead more about 3d Mode in Firefox
Sleepy_Puppy
  • News

Netflix Announce Sleepy Puppy XSS Payload Management Tool

September 3, 2015

          Sleepy Puppy is a XSS payload management framework that enables security engineers to simplify the...

Read MoreRead more about Netflix Announce Sleepy Puppy XSS Payload Management Tool
alert-banner
  • News

BrowserFox variant High Stairs

August 25, 2015

Browsefox aka Sambreel aka Yontoo is a family of browser hijackers. When advertised they promise to “customize and enhance your...

Read MoreRead more about BrowserFox variant High Stairs
ielogo
  • News

CVE-2015-2502 Microsoft issues emergency patch for all versions of Windows

August 19, 2015

This is the second "critical" out-of-band patch issued in as many months. It's all Internet Explorer's fault -- again. Microsoft...

Read MoreRead more about CVE-2015-2502 Microsoft issues emergency patch for all versions of Windows
vw
  • News

VW tried to hide hacking exploits on its cars

August 18, 2015

For 2 years VW tried to hide the exploits that made its cars hack-able . Now, many might be getting...

Read MoreRead more about VW tried to hide hacking exploits on its cars
lenovo
  • News

Lenovo stuffs laptops with a rootkit in the BIOS

August 14, 2015

Lenovo has sold laptops bundled with irremovable software that features a bonus exploitable security vulnerability. If the crapware is deleted,...

Read MoreRead more about Lenovo stuffs laptops with a rootkit in the BIOS
android
  • News

Androids still vulnerable, even after Google patch

August 14, 2015

Update flawed, new one needed for countless gadgets Google's security update to fix the Stagefright vulnerability in millions of Android...

Read MoreRead more about Androids still vulnerable, even after Google patch

Posts pagination

Previous 1 … 4,070 4,071 4,072 4,073 4,074 4,075 4,076 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Grafton Technologies

May 14, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Regal Ideas

May 14, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Av Alumitran

May 14, 2025
Palo_Alto_Networks_Logo
  • Vulnerabilities

[Palo Alto Networks Security Advisories] PAN-SA-2025-0010 Informational Bulletin: No Impact of the Marvin Attack onPAN-OS

May 14, 2025
Palo_Alto_Networks_Logo
  • Vulnerabilities

[Palo Alto Networks Security Advisories] CVE-2025-0133 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability inGlobalProtect Gateway and Portal

May 14, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel