Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025
unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025
unlock_membership
  • Premium Members Content

Mastering Social Engineering Attacks How to Recognize and Prevent Them

May 23, 2025
unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Malware-200x125-4
  • News

Waterbear is Back, Uses API Hooking to Evade Security Product Detection

December 12, 2019

By Vickie Su, Anita Hsieh, and Dove Chiu Waterbear, which has been around for several years, is a campaign that...

Read MoreRead more about Waterbear is Back, Uses API Hooking to Evade Security Product Detection
feature_vul-300x300-200x200
  • News

December Patch Tuesday: Vulnerabilities in Windows components, RDP, and PowerPoint Get Fixes

December 12, 2019

Microsoft released a total of 36 patches for December’s Patch Tuesday. Decembers tend to have a relatively low number of...

Read MoreRead more about December Patch Tuesday: Vulnerabilities in Windows components, RDP, and PowerPoint Get Fixes
Malware-200x125-3
  • News

Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign

December 12, 2019

by William Gamazo Sanchez and Joseph C. Chen In November 2019, we published a blog analyzing an exploit kit we...

Read MoreRead more about Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
Mobile-200x125
  • News

Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack

December 12, 2019

We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which...

Read MoreRead more about Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
security-orchestration-command-soc-blog-1
  • News

Building a Culture of Security Awareness: How to Use Performance Metrics to Communicate SOC Effectiveness Throughout Your Org

December 12, 2019

It’s no secret that as the security landscape becomes increasingly complex, resources are becoming harder and harder to find. Team...

Read MoreRead more about Building a Culture of Security Awareness: How to Use Performance Metrics to Communicate SOC Effectiveness Throughout Your Org
internet-of-things-disclosure-childrens-gps-smart-watches
  • News

IoT Vuln Disclosure: Children’s GPS Smart Watches (R7-2019-57)

December 12, 2019

Executive summary As part of a recent IoT hacking training exercise, a number of Rapid7 penetration testers set out to...

Read MoreRead more about <div>IoT Vuln Disclosure: Children’s GPS Smart Watches (R7-2019-57)</div>
patches-2
  • News

Patch Tuesday – December 2019

December 12, 2019

Today we come to the end of 2019's monthly Microsoft Patch Tuesday (also known as Update Tuesday). This Christmas, Microsoft...

Read MoreRead more about Patch Tuesday – December 2019
rapid7-security-technology-secure-enviornment-vulnerability-risk-management
  • News

How to Actually Reduce Risk in Your Environment

December 12, 2019

What is a vulnerability risk management program? A vulnerability risk management program is imperative at any organization to secure assets,...

Read MoreRead more about How to Actually Reduce Risk in Your Environment
Copy-of-30-DAYS-OF-HAXMAS-19-
  • News

How I Shut Down a (Test) Factory with a Single Layer 2 Packet

December 12, 2019

At Rapid7 Labs we are always on the look for new research topics and fields to stick our fingers in...

Read MoreRead more about How I Shut Down a (Test) Factory with a Single Layer 2 Packet
osint
  • News

Ffuf – Fast Web Fuzzer Written In Go

December 12, 2019

A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz.FeaturesFast!Allows fuzzing of HTTP header values,...

Read MoreRead more about Ffuf – Fast Web Fuzzer Written In Go
malware
  • News

Fileintel – A Modular Python Application To Pull Intelligence About Malicious Files

December 12, 2019

This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular...

Read MoreRead more about Fileintel – A Modular Python Application To Pull Intelligence About Malicious Files
genact_9_cc
  • News

Genact – A Nonsense Activity Generator

December 12, 2019

Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with...

Read MoreRead more about Genact – A Nonsense Activity Generator
Ryuk
  • News

Anti-Virus Maker Discovers A Bug within Ryuk Ransomware

December 12, 2019

An antivirus maker discovered a bug in the decrypter application of the Ryuk Ransomware, the application "the Ryuk gang" basically...

Read MoreRead more about Anti-Virus Maker Discovers A Bug within Ryuk Ransomware
scamtext-255x300
  • News

Fake Elder Scrolls Online developers go phishing on PlayStation

December 12, 2019

A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via...

Read MoreRead more about Fake Elder Scrolls Online developers go phishing on PlayStation
osint
  • News

A week in security (December 2 – December 8)

December 12, 2019

Last week on Malwarebytes Labs, we took a look at a new version of the IcedID Trojan, described web skimmers...

Read MoreRead more about A week in security (December 2 – December 8)
osint
  • News

Please don’t buy this: smart doorbells

December 12, 2019

Though Black Friday and Cyber Monday are over, the two shopping holidays were just precursors to the larger Christmas season—a...

Read MoreRead more about Please don’t buy this: smart doorbells
forum_spam
  • News

Hundreds of counterfeit online shoe stores injected with credit card skimmer

December 12, 2019

There’s a well-worn saying in security: “If it’s too good to be true, then it probably isn’t.” This can easily...

Read MoreRead more about Hundreds of counterfeit online shoe stores injected with credit card skimmer
cyber-security-1805632_960_720-2
  • News

Attacks on IoT devices and WebApps on an extreme rise for the Q3

December 12, 2019

Ransomware threats and Malware numbers have fallen but are presently more active and dangerous. More than 7.2 Billion virus attacks...

Read MoreRead more about Attacks on IoT devices and WebApps on an extreme rise for the Q3
  • News

Pensacola City Hit by a Cyberattack After Deadly Shooting at Naval Air Station

December 12, 2019

The city of Pensacola, Florida was hit by a cyberattack that came in the wake of a deadly shooting at...

Read MoreRead more about Pensacola City Hit by a Cyberattack After Deadly Shooting at Naval Air Station
003-2
  • News

State of the Art Cyber-Security and Network Security a Top Priority for The Business Market

December 12, 2019

Reportedly, accepting the growing need for better cyber-security tactics and embracing a further developed regime for securing the businesses on...

Read MoreRead more about State of the Art Cyber-Security and Network Security a Top Priority for The Business Market
aerial-view-of-parking-lot-2402235-2
  • News

The Ministry of Communications of Russia has developed a new service for the sale of cars

December 12, 2019

According to Deputy head of the Ministry of Communications Maxim Parshin, the Ministry of Communications and the Ministry of Internal...

Read MoreRead more about The Ministry of Communications of Russia has developed a new service for the sale of cars
cyber2Bcrime-2
  • News

Hackers steal money from cards through the Uber and VTB applications

December 12, 2019

A resident of Russia Anna Kozlova, resting in Spain, lost 14 thousand rubles ($220). The money was stolen from her...

Read MoreRead more about Hackers steal money from cards through the Uber and VTB applications
image
  • News

Julian Assange arrested: WikiLeaks founder arrested in London

April 11, 2019

WikiLeaks founder Julian Assange has been arrested at the Ecuadorian embassy in London, Scotland Yard said. Home Secretary Sajid Javid...

Read MoreRead more about Julian Assange arrested: WikiLeaks founder arrested in London
Cisco
  • News

CVE-2019-1663 | Cisco Routers – Critical 9.8 CVSS Score

February 28, 2019

Cisco is warning businesses that use its wireless VPN and firewall routers to install updates immediately due to a critical...

Read MoreRead more about CVE-2019-1663 | Cisco Routers – Critical 9.8 CVSS Score

Posts pagination

Previous 1 … 4,104 4,105 4,106 4,107 4,108 4,109 4,110 … 4,114 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5326

May 30, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47288

May 30, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-47933

May 30, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4967

May 30, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5328

May 30, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel