Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
tiktok-5482438_960_720
  • News

TikTok Files Lawsuit Against the U.S. Government Over Ban of Its Application

August 25, 2020

Tiktok has confirmed that it is going to sue the U.S. government for banning the use of Tiktok application in...

Read MoreRead more about TikTok Files Lawsuit Against the U.S. Government Over Ban of Its Application
securelist_abs_1-990x400-1
  • News

Lifting the veil on DeathStalker, a mercenary triumvirate

August 25, 2020

State-sponsored threat actors and sophisticated attacks are often in the spotlight. Indeed, their innovative techniques, advanced malware platforms and 0-day...

Read MoreRead more about Lifting the veil on DeathStalker, a mercenary triumvirate
h115
  • News

Yeti – Your Everyday Threat Intelligence

August 25, 2020

Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified...

Read MoreRead more about Yeti – Your Everyday Threat Intelligence
Parth_4
  • News

Parth – Heuristic Vulnerable Parameter Scanner

August 25, 2020

Some HTTP parameter names are more commonly associated with one functionality than the others. For example, the parameter ?url= usually...

Read MoreRead more about Parth – Heuristic Vulnerable Parameter Scanner
r7-rotato-program
  • News

Life as a Rapid7 Rotato: Launch Your Career

August 25, 2020

At Rapid7, we believe that by hiring a team with a strong diversity of mindset, different levels of experience, and...

Read MoreRead more about Life as a Rapid7 Rotato: Launch Your Career
cyber-security-3360776_960_720
  • News

Here’s how to Ensure Data Security Using FShred App

August 24, 2020

Users are well aware of the fact that while deleting photos, videos, files, or any other form of data on...

Read MoreRead more about Here’s how to Ensure Data Security Using FShred App
960x0
  • News

Uber’s Former Chief Security Officer Charged for Covering up A Massive Data Breach

August 24, 2020

Uber's former chief security officer, Joe Sullivan, was very recently charged by the federal prosecutors in the United States for...

Read MoreRead more about Uber’s Former Chief Security Officer Charged for Covering up A Massive Data Breach
pyre-check_1_logo
  • News

Pyre-Check – Performant Type-Checking For Python

August 24, 2020

Pyre is a performant type checker for Python compliant with PEP 484. Pyre can analyze codebases with millions of lines...

Read MoreRead more about Pyre-Check – Performant Type-Checking For Python
IntelOwl_1_intel_owl
  • News

Intel Owl – Analyze Files, Domains, IPs In Multiple Ways From A Single API At Scale

August 24, 2020

Do you want to get threat intelligence data about a file, an IP or a domain?Do you want to get...

Read MoreRead more about Intel Owl – Analyze Files, Domains, IPs In Multiple Ways From A Single API At Scale
IMG_2351
  • News

Russian media reported on fake domains for pre-ordering coronavirus vaccine

August 23, 2020

After the Russian Ministry of Health registered the first coronavirus vaccine, the number of new domains associated with the vaccine...

Read MoreRead more about Russian media reported on fake domains for pre-ordering coronavirus vaccine
349819
  • News

Scan-For-Webcams – Scan For Webcams In The Internet

August 23, 2020

Automatically scan for publically accessible webcams around the internetUsage python MJPG.py : for public MJPG streamers around the internet python...

Read MoreRead more about Scan-For-Webcams – Scan For Webcams In The Internet
cloud-sniper_1_logo
  • News

Cloud-Sniper – Virtual Security Operations Center

August 23, 2020

Cloud Security OperationsWhat is Cloud Sniper?Cloud Sniper is a platform designed to manage Security Operations in cloud environments. It is...

Read MoreRead more about Cloud-Sniper – Virtual Security Operations Center
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

LiveAuctioneers – 3,385,862 breached accounts

August 22, 2020

In June 2020, the online antiques marketplace LiveAuctioneers suffered a data breach which was subsequently sold online then extensively redistributed...

Read MoreRead more about LiveAuctioneers – 3,385,862 breached accounts
osint
  • News

‘Just tell me how to fix my computer:’ a crash course on malware detection

August 22, 2020

Malware. You’ve heard the term before, and you know it’s bad for your computer—like a computer virus. Which begs the...

Read MoreRead more about ‘Just tell me how to fix my computer:’ a crash course on malware detection
SecGen_1_secgen_default_scenario_run
  • News

SecGen – Create Randomly Insecure VMs

August 22, 2020

SecGen creates vulnerable virtual machines, lab environments, and hacking challenges, so students can learn security penetration testing techniques.Boxes like Metasploitable2...

Read MoreRead more about SecGen – Create Randomly Insecure VMs
adbsploit_1_adbsploit
  • News

ADBSploit – A Python Based Tool For Exploiting And Managing Android Devices Via ADB

August 22, 2020

A python based tool for exploiting and managing Android devices via ADBCurrently on developmentScreenrecordStream ScreenrecordExtract ContactsExtract SMSExtract Messasing App Chats...

Read MoreRead more about ADBSploit – A Python Based Tool For Exploiting And Managing Android Devices Via ADB
osint
  • Vulnerabilities

Open-Xchange Security Advisory 2020-08-20

August 21, 2020

Posted by Open-Xchange GmbH via Fulldisclosure on Aug 21Dear subscribers, we're sharing our latest advisory with you and like to...

Read MoreRead more about Open-Xchange Security Advisory 2020-08-20
osint
  • Vulnerabilities

Payment bypass in WordPress – WooCommerce – NAB Transact plugin disclosure

August 21, 2020

Posted by Jack Misiura via Fulldisclosure on Aug 21Title: Payment bypass Product: WordPress NAB Transact WooCommerce Plugin Vendor Homepage: https://woocommerce.com/products/nab-transact-direct-post/...

Read MoreRead more about Payment bypass in WordPress – WooCommerce – NAB Transact plugin disclosure
GettyImages-953921126-e1597951075488-1024x614-1
  • News

Threat hunters watch as Chinese hackers forage forums for tools

August 21, 2020

Pictured: The Forbidden City, in Beijing. Experts say Chinese APT operations use a mix of proprietary and publicly available tools...

Read MoreRead more about Threat hunters watch as Chinese hackers forage forums for tools
osint
  • News

Apple OS developer supply chain threatened by ‘clever’ malware attack

August 21, 2020

In an attack described as a “clever” supply-chain threat, XCSSET malware is being injected undetected into programs created by unwitting...

Read MoreRead more about Apple OS developer supply chain threatened by ‘clever’ malware attack
osint
  • News

DHS and FBI warn of North Korean malware targeted at defense contractors

August 21, 2020

The Department of Homeland Security and Federal Bureau of Investigation published an alert Wednesday about malware it claims North Korea...

Read MoreRead more about DHS and FBI warn of North Korean malware targeted at defense contractors
osint
  • News

Hackers Can Now Clone Your Key Using Just a Smartphone Microphone and a Program

August 21, 2020

Earlier this year researchers at the National University of Singapore came up and published a paper enumerating how, utilizing just...

Read MoreRead more about Hackers Can Now Clone Your Key Using Just a Smartphone Microphone and a Program
IMG_2329
  • News

More than 100 websites selling air tickets in Russia turned out to be fraudulent

August 21, 2020

Cybercriminals continue to deceive people. According to the Group-IB, over the past few months, more than 100 fraudulent sites in...

Read MoreRead more about More than 100 websites selling air tickets in Russia turned out to be fraudulent
IMG_2319
  • News

Expert Malnev gave tips on detecting Keylogger

August 21, 2020

Alexey Malnev, head of the Jet CSIRT Information Security Monitoring and Incident Response Center of Jet Infosystems, spoke about how...

Read MoreRead more about Expert Malnev gave tips on detecting Keylogger

Posts pagination

Previous 1 … 4,087 4,088 4,089 4,090 4,091 4,092 4,093 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel