Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
IMG_2434
  • News

The Ministry of Internal Affairs of Bashkortostan intends to cooperate with white hackers to reduce cyber crime

August 30, 2020

The Ministry of Internal Affairs of Bashkortostan is ready to cooperate with white hackers and programmers to solve Internet crimes...

Read MoreRead more about The Ministry of Internal Affairs of Bashkortostan intends to cooperate with white hackers to reduce cyber crime
osint
  • News

How a loyal employee saved Tesla from a Russian 1 million malware attack

August 30, 2020

As Justin Richards said, "heroes can be found in the most unlikely places. Perhaps we all have it within us...

Read MoreRead more about How a loyal employee saved Tesla from a Russian 1 million malware attack
osint
  • News

Nefilim Ransomware Evolving Rapidly: Top Targets at a Glance

August 30, 2020

Ransomware has continually expanded both in terms of threat and reach as threat actors continue to devise fresh methods of...

Read MoreRead more about Nefilim Ransomware Evolving Rapidly: Top Targets at a Glance
urlgrab
  • News

Urlgrab – A Golang Utility To Spider Through A Website Searching For Additional Links

August 30, 2020

A golang utility to spider through a website searching for additional links with support for JavaScript rendering.Installgo get -u github.com/iamstoxe/urlgrabFeaturesCustomizable...

Read MoreRead more about Urlgrab – A Golang Utility To Spider Through A Website Searching For Additional Links
Osintgram_4_cmd
  • News

Osintgram – A OSINT Tool On Instagram

August 30, 2020

Osintgram is a OSINT tool on Instagram.Osintgram offers an interactive shell to perform analysis on Instagram account of any users...

Read MoreRead more about Osintgram – A OSINT Tool On Instagram
osint
  • Vulnerabilities

SUPERAntiSpyware Professional X Trial < 10.0.1206 Local Privilege Escalation

August 29, 2020

Posted by b1nary on Aug 29# Vulnerability Description SUPERAntiSpyware Professional X Trial versions prior to 10.0.1206 are vulnerable to local...

Read MoreRead more about SUPERAntiSpyware Professional X Trial < 10.0.1206 Local Privilege Escalation
osint
  • Vulnerabilities

Missing Trust Validation in Visual Studio’s VSIX Installer

August 29, 2020

Posted by Ostovary, Daniel on Aug 29Hi, we have recently discovered a vulnerability in the VSIX Installer of Visual Studio....

Read MoreRead more about Missing Trust Validation in Visual Studio’s VSIX Installer
osint
  • Vulnerabilities

Three vulnerabilities found in MikroTik’s RouterOS

August 29, 2020

Posted by Q C on Aug 29Advisory: three vulnerabilities found in MikroTik's RouterOS Details ======= Product: MikroTik's RouterOS Vendor URL:...

Read MoreRead more about Three vulnerabilities found in MikroTik’s RouterOS
IMG_2412
  • News

The data of 55 thousand clients of Russian banks were publicly available

August 29, 2020

 The Bank of Russia and the Visa payment system have notified credit institutions about the leakage of bank customer card...

Read MoreRead more about The data of 55 thousand clients of Russian banks were publicly available
vpn-4046047_960_720
  • News

APT36: A Pakistani Hacking Group, Strengthens Its Operations and Finds New Targets

August 29, 2020

Famous as APT36, Transparent Tribe is a hacking group that works from Pakistan. APT36 is infamous for monitoring and spying...

Read MoreRead more about APT36: A Pakistani Hacking Group, Strengthens Its Operations and Finds New Targets
osint
  • News

The new iOS 14 to drop Facebook’s Audience Network Advertising to 50%

August 29, 2020

Facebook on Wednesday posted a response to the new iOS 14 on their official blog stating that the new iOS...

Read MoreRead more about The new iOS 14 to drop Facebook’s Audience Network Advertising to 50%
Active-Directory
  • News

Vulnerable-AD – Create A Vulnerable Active Directory That’S Allowing You To Test Most Of Active Directory Attacks In Local Lab

August 29, 2020

Create a vulnerable active directory that's allowing you to test most of active directory attacks in local lab.Main FeaturesRandomize AttacksFull...

Read MoreRead more about Vulnerable-AD – Create A Vulnerable Active Directory That’S Allowing You To Test Most Of Active Directory Attacks In Local Lab
bluescan_2_example-le-scan
  • News

Bluescan – A Powerful Bluetooth Scanner For Scanning BR/LE Devices, LMP, SDP, GATT And Vulnerabilities!

August 29, 2020

Bluescan is a open source project by Sourcell Xu from DBAPP Security HatLab. Anyone may redistribute copies of bluescan to...

Read MoreRead more about Bluescan – A Powerful Bluetooth Scanner For Scanning BR/LE Devices, LMP, SDP, GATT And Vulnerabilities!
GettyImages-630047974-1024x683-1
  • News

Trojan infects NCR, posing risk to supply chain

August 28, 2020

String of ATMs seen at Hartsfield-Jackson Atlanta International Airport. A trojan infected NCR Corporation, potentially posing a supply chain risk...

Read MoreRead more about Trojan infects NCR, posing risk to supply chain
osint
  • News

Missing person scams: what to watch out for

August 28, 2020

Social media has a long history of people asking for help or giving advice to other users. One common feature...

Read MoreRead more about Missing person scams: what to watch out for
114115407_gettyimages-168439168
  • News

NZ Stock Exchange Halted Temporarily Twice After Being Hit by Cyber Attacks

August 28, 2020

The New Zealand stock exchange was hit by a cyber-attack due to which it had to remain offline two days...

Read MoreRead more about NZ Stock Exchange Halted Temporarily Twice After Being Hit by Cyber Attacks
IMG_2410
  • News

Russian citizen arrested in the United States on charges of organizing a cyber crime

August 28, 2020

According to the Ministry of Justice, 27-year-old Yegor Kryuchkov tried to pay $1 million to an employee of a company...

Read MoreRead more about Russian citizen arrested in the United States on charges of organizing a cyber crime
h135
  • News

SharpHose – Asynchronous Password Spraying Tool In C# For Windows Environments

August 28, 2020

SharpHose is a C# password spraying tool designed to be fast, safe, and usable over Cobalt Strike's execute-assembly. It provides...

Read MoreRead more about SharpHose – Asynchronous Password Spraying Tool In C# For Windows Environments
bashtop_1_logo-t
  • News

Bashtop – Linux/OSX/FreeBSD Resource Monitor

August 28, 2020

Bpytop, bashtop python port is now available at https://github.com/aristocratos/bpytopIt's a lot faster and about a third as cpu heavy and...

Read MoreRead more about Bashtop – Linux/OSX/FreeBSD Resource Monitor
osint
  • Vulnerabilities

SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S

August 28, 2020

Posted by SEC Consult Vulnerability Lab on Aug 27SEC Consult Vulnerability Lab Security Advisory < 20200827-0 > ======================================================================= title: Multiple...

Read MoreRead more about SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S
osint
  • Vulnerabilities

SEC Consult SA-20200826-0 :: Extensive file permissions on service executable in Eikon Thomson Reuters

August 28, 2020

Posted by SEC Consult Vulnerability Lab on Aug 27SEC Consult Vulnerability Lab Security Advisory < 20200826-0 > ======================================================================= title: Extensive...

Read MoreRead more about SEC Consult SA-20200826-0 :: Extensive file permissions on service executable in Eikon Thomson Reuters
IoT
  • News

Internet of Things Cybersecurity Regulation and Rapid7

August 28, 2020

Public policy and the Internet of ThingsOver the past few years, the security of the Internet of Things (IoT) has...

Read MoreRead more about Internet of Things Cybersecurity Regulation and Rapid7
Chart_Q1_200820-600x216-1
  • News

Good news: Stalkerware survey results show majority of people aren’t creepy

August 27, 2020

Back in July, we sent out a survey to Malwarebytes Labs readers on the subject of stalkerware—the term used to describe...

Read MoreRead more about Good news: Stalkerware survey results show majority of people aren’t creepy
IMG_2405
  • News

Experts identified flaw that allows criminals to steal money using Faster Payments System (FPS)

August 27, 2020

Experts have identified a flaw that allows criminals to steal money from accounts of clients of banks through the Faster...

Read MoreRead more about Experts identified flaw that allows criminals to steal money using Faster Payments System (FPS)

Posts pagination

Previous 1 … 4,085 4,086 4,087 4,088 4,089 4,090 4,091 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of June 16, 2025

June 23, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel