Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025
unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025
unlock_membership
  • Premium Members Content

Mastering Social Engineering Attacks How to Recognize and Prevent Them

May 23, 2025
unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
genact_9_cc
  • News

Genact – A Nonsense Activity Generator

December 12, 2019

Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with...

Read MoreRead more about Genact – A Nonsense Activity Generator
Ryuk
  • News

Anti-Virus Maker Discovers A Bug within Ryuk Ransomware

December 12, 2019

An antivirus maker discovered a bug in the decrypter application of the Ryuk Ransomware, the application "the Ryuk gang" basically...

Read MoreRead more about Anti-Virus Maker Discovers A Bug within Ryuk Ransomware
scamtext-255x300
  • News

Fake Elder Scrolls Online developers go phishing on PlayStation

December 12, 2019

A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via...

Read MoreRead more about Fake Elder Scrolls Online developers go phishing on PlayStation
osint
  • News

A week in security (December 2 – December 8)

December 12, 2019

Last week on Malwarebytes Labs, we took a look at a new version of the IcedID Trojan, described web skimmers...

Read MoreRead more about A week in security (December 2 – December 8)
osint
  • News

Please don’t buy this: smart doorbells

December 12, 2019

Though Black Friday and Cyber Monday are over, the two shopping holidays were just precursors to the larger Christmas season—a...

Read MoreRead more about Please don’t buy this: smart doorbells
forum_spam
  • News

Hundreds of counterfeit online shoe stores injected with credit card skimmer

December 12, 2019

There’s a well-worn saying in security: “If it’s too good to be true, then it probably isn’t.” This can easily...

Read MoreRead more about Hundreds of counterfeit online shoe stores injected with credit card skimmer
cyber-security-1805632_960_720-2
  • News

Attacks on IoT devices and WebApps on an extreme rise for the Q3

December 12, 2019

Ransomware threats and Malware numbers have fallen but are presently more active and dangerous. More than 7.2 Billion virus attacks...

Read MoreRead more about Attacks on IoT devices and WebApps on an extreme rise for the Q3
  • News

Pensacola City Hit by a Cyberattack After Deadly Shooting at Naval Air Station

December 12, 2019

The city of Pensacola, Florida was hit by a cyberattack that came in the wake of a deadly shooting at...

Read MoreRead more about Pensacola City Hit by a Cyberattack After Deadly Shooting at Naval Air Station
003-2
  • News

State of the Art Cyber-Security and Network Security a Top Priority for The Business Market

December 12, 2019

Reportedly, accepting the growing need for better cyber-security tactics and embracing a further developed regime for securing the businesses on...

Read MoreRead more about State of the Art Cyber-Security and Network Security a Top Priority for The Business Market
aerial-view-of-parking-lot-2402235-2
  • News

The Ministry of Communications of Russia has developed a new service for the sale of cars

December 12, 2019

According to Deputy head of the Ministry of Communications Maxim Parshin, the Ministry of Communications and the Ministry of Internal...

Read MoreRead more about The Ministry of Communications of Russia has developed a new service for the sale of cars
cyber2Bcrime-2
  • News

Hackers steal money from cards through the Uber and VTB applications

December 12, 2019

A resident of Russia Anna Kozlova, resting in Spain, lost 14 thousand rubles ($220). The money was stolen from her...

Read MoreRead more about Hackers steal money from cards through the Uber and VTB applications
image
  • News

Julian Assange arrested: WikiLeaks founder arrested in London

April 11, 2019

WikiLeaks founder Julian Assange has been arrested at the Ecuadorian embassy in London, Scotland Yard said. Home Secretary Sajid Javid...

Read MoreRead more about Julian Assange arrested: WikiLeaks founder arrested in London
Cisco
  • News

CVE-2019-1663 | Cisco Routers – Critical 9.8 CVSS Score

February 28, 2019

Cisco is warning businesses that use its wireless VPN and firewall routers to install updates immediately due to a critical...

Read MoreRead more about CVE-2019-1663 | Cisco Routers – Critical 9.8 CVSS Score
image
  • News

CVE-2019-1674 | New Elevation of Privilege Vulnerability Found in Cisco WebEx Meetings

February 28, 2019

A vulnerability found in the update service of the Cisco Webex Meetings Desktop App for Windows could allow an unprivileged local attacker...

Read MoreRead more about CVE-2019-1674 | New Elevation of Privilege Vulnerability Found in Cisco WebEx Meetings
image
  • News

Chrome Zero-Day Exploited to Harvest User Data via PDF Files

February 28, 2019

Exploit detection service EdgeSpot says it has spotted several PDF documents that exploit a zero-day vulnerability in Chrome to collect...

Read MoreRead more about Chrome Zero-Day Exploited to Harvest User Data via PDF Files
image
  • News

Government-funded researchers investigate vulnerabilities in EV charging stations

February 28, 2019

Charging stations for electric cars have sprung up across the country in recent years as hybrid vehicles continue to gain...

Read MoreRead more about Government-funded researchers investigate vulnerabilities in EV charging stations
image
  • News

IBM’s X-Force says who needs malware, PowerShell FTW!

February 28, 2019

If anyone reading this works in InfoSec, as I do then you will know that a company's internal network, once...

Read MoreRead more about IBM’s X-Force says who needs malware, PowerShell FTW!
image
  • News

New Golang brute-forcer discovered amid rise in e-commerce attacks

February 28, 2019

E-commerce websites continue to be targeted by online criminals looking to steal personal and payment information directly from unaware shoppers....

Read MoreRead more about New Golang brute-forcer discovered amid rise in e-commerce attacks
qq
  • News

Online Bidding-Themed Phishing Campaigns Aims to Trick U.S. Federal Government Contractors

February 27, 2019

On February 23, 2019, Anomali Labs found a suspicious-looking subdomain transportationgovbidsynckelapw containing the legitimate domain transportation.gov for the U.S. Department...

Read MoreRead more about Online Bidding-Themed Phishing Campaigns Aims to Trick U.S. Federal Government Contractors
Shareit_logo
  • News

High-Severity SHAREit App Flaws Open Files for the Taking

February 26, 2019

Two high-severity flaws in the SHAREit Android app allow an attacker to bypass the file transfer application’s device authentication mechanism...

Read MoreRead more about High-Severity SHAREit App Flaws Open Files for the Taking
2019-02-26_14-08
  • News

Malware Triggers in Outlook Preview Without User Opening Word Document

February 26, 2019

A recent malware sample forwarded to our Threat Intelligence service had some very interesting properties which we think would be useful to...

Read MoreRead more about Malware Triggers in Outlook Preview Without User Opening Word Document
mozilla
  • News

Mozilla fears encryption law could turn its employees into insider threats

February 26, 2019

Mozilla has told the Australian government that its anti-encryption laws could turn its own employees into insider threats.The Mozilla Corporation,...

Read MoreRead more about Mozilla fears encryption law could turn its employees into insider threats
linkedin
  • News

Hackers abuse LinkedIn DMs to plant malware

February 26, 2019

Hackers are impersonating recruitment agencies on LinkedIn in a bid to target companies with backdoor malware. Researchers at Proofpoint found...

Read MoreRead more about Hackers abuse LinkedIn DMs to plant malware
marionet
  • News

New browser based attack called MarioNet

February 26, 2019

Academics from Greece have devised a new browser-based attack that can allow hackers to run malicious code inside users' browsers...

Read MoreRead more about New browser based attack called MarioNet

Posts pagination

Previous 1 … 4,104 4,105 4,106 4,107 4,108 4,109 4,110 … 4,114 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: Jordan Drug

May 30, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4947

May 30, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27526

May 30, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-54020

May 30, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel