Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for a Robust Defense

May 30, 2025
unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025
unlock_membership
  • Premium Members Content

Mastering Social Engineering Attacks How to Recognize and Prevent Them

May 23, 2025
unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
hacker
  • News

An Anonymous group just took down a fifth of the dark web

February 3, 2017

Visitors to more than 10,000 Tor-based websites were met with an alarming announcement this morning: “Hello, Freedom Hosting II, you...

Read MoreRead more about An Anonymous group just took down a fifth of the dark web
cisco
  • News

Cisco Prime Home: Hackers in your network?

February 3, 2017

As we connect more and more devices to the internet, we create more and more potential security vulnerabilities. While we’re...

Read MoreRead more about Cisco Prime Home: Hackers in your network?
2016-12-18 12_55_16- Status_ Dashboard
  • Tutorials

Snoopers Charter + PfSense + NordVPN Tutorial

December 18, 2016

So due to the UK government being dicks and forcing all UK ISPs for store logs for 1 year of...

Read MoreRead more about Snoopers Charter + PfSense + NordVPN Tutorial
_dsc8409
  • Product Review

Nuvio Power Bank Review

November 18, 2016

Portable Power Banks are a great way to stay connected when travelling, out and about or even just to give...

Read MoreRead more about Nuvio Power Bank Review
selection_056
  • News

Three Mobile Data Breach

November 18, 2016

Customer information from more than 130,000 users of the Three mobile network has been compromised in a cyber security breach,...

Read MoreRead more about Three Mobile Data Breach
may
  • News

UK Snoopers Charter 2 passed

November 18, 2016

Well that's not good, not good at all. The new bill will force internet companies to store their users’ browsing data...

Read MoreRead more about UK Snoopers Charter 2 passed
selection_053
  • Tutorials

How to delete multiple Google Calendar events

November 16, 2016

IF like me you have moved from one service to another over the years, you have probably exported a calendar...

Read MoreRead more about How to delete multiple Google Calendar events
20161104_101347
  • News

BlackHat Europe 2016: Day 2 of 2

November 4, 2016

Day 2 at Blackhat EU 2016 and had a great day. This talk Breaking Big Data: Evading Analysis of the...

Read MoreRead more about BlackHat Europe 2016: Day 2 of 2
img-20161103-wa0004
  • News

BlackHat Europe 2016: Day 1 of 2

November 3, 2016

Today was day 1 of 2 for me at BlackHat Europe 2016, one of my highlights was the tool Bloodhound ...

Read MoreRead more about BlackHat Europe 2016: Day 1 of 2
selection_047
  • News

Shadow Brokers leak list of hacked NSA Servers

October 31, 2016

The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking...

Read MoreRead more about Shadow Brokers leak list of hacked NSA Servers
screenshot-2
  • Tutorials

How to Recove Data from a bit-lockered drive that is dying

October 30, 2016

So today i go home and fired up the Windows 10 PC with all of my drives Bitlockered. Long story...

Read MoreRead more about How to Recove Data from a bit-lockered drive that is dying
Botnet
  • News

Well thanks anna-senpai for the Mirai source code release

October 28, 2016

Yeah, thanks a lot.... in-case you can't tell its my sarcasm kicking in. After doing heavy damage to KrebsOnSecurity and...

Read MoreRead more about Well thanks anna-senpai for the Mirai source code release
capture
  • News

Testing for the dirty cow CVE-2016-5195?

October 21, 2016

On october 19 2016, the Dirty Cow vulnerability went public (which is kernel privilege escalation vulnerability) . From what I...

Read MoreRead more about Testing for the dirty cow CVE-2016-5195?
linux-server
  • News

Potential Ransomware Hits Linux Servers

August 31, 2016

Linux running web servers appear to be at risk of a new strain of ransomware called FairWare. Three Linux administrators,...

Read MoreRead more about Potential Ransomware Hits Linux Servers
Botnet
  • News

Kelihos Botnet now dishing out Ransomware

August 30, 2016

Kelihos is one of the oldest botnets, first spotted way back in 2008, but it has managed to survive a...

Read MoreRead more about Kelihos Botnet now dishing out Ransomware
Selection_009
  • News

NSA potentially hacked by The Shadow Brokers

August 15, 2016

It seems that the NSA has been hacked. This is being speculated after a group of hackers going by the...

Read MoreRead more about NSA potentially hacked by The Shadow Brokers
bbc
  • News

BBC sniffing Wi-Fi packets to detect BBC iPlayer users without TV Licence.

August 8, 2016

From September 1, you'll need a TV licence if you stream catch-up or on-demand TV from the BBC's iPlayer service, regardless...

Read MoreRead more about BBC sniffing Wi-Fi packets to detect BBC iPlayer users without TV Licence.
Zero Days
  • News

Stuxnet : Operation Olympic Games NSA Codename

July 11, 2016

Everyone knows about the joint USA and Israeli malware called Stuxnet that was designed to put a halt to the...

Read MoreRead more about Stuxnet : Operation Olympic Games NSA Codename
adobe-hack
  • News

Adobe Flash zero-day actively exploited in targeted attacks

June 15, 2016

A zero-day vulnerability affecting the latest version of Adobe Flash Player and all previous ones is being actively exploited in...

Read MoreRead more about Adobe Flash zero-day actively exploited in targeted attacks
guccifer-hillary
  • News

Hacker ‘Guccifer’: I Got Inside Hillary Clinton’s Server

June 11, 2016

The Romanian hacker who first exposed Hillary Clinton's private email address is making a bombshell new claim — that he...

Read MoreRead more about Hacker ‘Guccifer’: I Got Inside Hillary Clinton’s Server
Selection_036
  • Tutorials

Facebook Chess

June 11, 2016

Well, not really a security related post but just found out that you can play chess in Facebook Messenger.. Like...

Read MoreRead more about Facebook Chess
firewall
  • News

Are we surpirsed that Millions of ‘must be firewalled’ services are open to the entire internet

June 9, 2016

Millions of services that ought to be restricted are exposed on the open internet, creating a huge risk of hacker...

Read MoreRead more about Are we surpirsed that Millions of ‘must be firewalled’ services are open to the entire internet
teamviewer
  • News

Team viewer to beef up security after “hacks” and DDoS

June 9, 2016

TeamViewer has announced two new features today aimed at boosting the app's security after the company's reputation was smirched this...

Read MoreRead more about Team viewer to beef up security after “hacks” and DDoS
LetsEncrypt
  • Tutorials

How to use Lets Encrypt on Go Daddy’s Shared Hosting Platform

June 8, 2016

So your looking for a way to use a free lets encrypt cert on your shared godaddy host? Well this...

Read MoreRead more about How to use Lets Encrypt on Go Daddy’s Shared Hosting Platform

Posts pagination

Previous 1 … 4,110 4,111 4,112 4,113 4,114 4,115 4,116 4,117 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2024-42190

May 31, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-48887

May 31, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5357

May 31, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5356

May 31, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5054

May 31, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel