Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Threat profile: Ranzy Locker ransomware

October 28, 2021

Ranzy Locker ransomware emerged in late 2020, when the variant began to target victims in the United States. According to a flash alert issued...

Read MoreRead more about Threat profile: Ranzy Locker ransomware
CVE-prog
  • Vulnerabilities

CVE-2020-28969

October 28, 2021

Summary: Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via...

Read MoreRead more about CVE-2020-28969
CVE-prog
  • Vulnerabilities

CVE-2019-10240

October 28, 2021

Summary: Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of...

Read MoreRead more about CVE-2019-10240
CVE-prog
  • Vulnerabilities

CVE-2021-24487

October 28, 2021

Summary: The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text...

Read MoreRead more about CVE-2021-24487
CVE-prog
  • Vulnerabilities

CVE-2021-34854

October 28, 2021

Summary: This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must...

Read MoreRead more about CVE-2021-34854
CVE-prog
  • Vulnerabilities

CVE-2021-34762

October 28, 2021

Summary: A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote...

Read MoreRead more about CVE-2021-34762
osint
  • News

German investigators identify crypto millionaire behind REvil operations

October 28, 2021

German authorities have identified a Russian man named Nikolay K. who is suspected to be a prominent member of the...

Read MoreRead more about German investigators identify crypto millionaire behind REvil operations
DonPAPI_1_Logo252520DonPapi-729454
  • Tools

DonPAPI – Dumping DPAPI Credz Remotely

October 28, 2021

Dumping revelant information on compromised targets without AV detection  DPAPI dumpingLots of credentials are protected by DPAPI. We aim at...

Read MoreRead more about DonPAPI – Dumping DPAPI Credz Remotely
osint
  • News

What is fileless malware?

October 28, 2021

Unlike traditional malware, which relies on a file being written to a disk, fileless malware is intended to be memory...

Read MoreRead more about What is fileless malware?
1f366
  • News

Crooks steal $130 million worth of cryptocurrency assets from Cream Finance

October 28, 2021

Threat actors have stolen $130 million worth of cryptocurrency assets from the Cream Finance decentralized finance (DeFi) platform. C.R.E.A.M. Finance...

Read MoreRead more about Crooks steal $130 million worth of cryptocurrency assets from Cream Finance
abstract-binary-990x400-1
  • News

Extracting type information from Go binaries

October 28, 2021

During the 2021 edition of the SAS conference, I had the pleasure of delivering a workshop focused on reverse-engineering Go...

Read MoreRead more about Extracting type information from Go binaries
1f64f
  • News

Avast releases free decrypters for AtomSilo and LockFile ransomware families

October 28, 2021

Security firm Avast released today decryptors for AtomSilo and LockFile ransomware that allow victims to recover their files for free....

Read MoreRead more about Avast releases free decrypters for AtomSilo and LockFile ransomware families
osint
  • News

Grief ransomware gang hit US National Rifle Association (NRA)

October 28, 2021

Grief ransomware operators claim to have compromised computer systems at US National Rifle Association (NRA) and added it to their...

Read MoreRead more about Grief ransomware gang hit US National Rifle Association (NRA)
clash_1_logo-709985
  • Tools

Clash – A Rule-Based Tunnel In Go

October 27, 2021

Download Clash If you like the site, please consider joining the telegram channel or supporting us on Patreon using the...

Read MoreRead more about Clash – A Rule-Based Tunnel In Go
osint
  • News

Avast released a free decryptor for Babuk ransomware

October 27, 2021

Researchers from cybersecurity firm Avast released a decryption tool for Babuk ransomware that allows victims to recover their files for...

Read MoreRead more about Avast released a free decryptor for Babuk ransomware
CVE-prog
  • Vulnerabilities

CVE-2021-38479

October 27, 2021

Summary: Many API function codes receive raw pointers remotely from the user and trust these pointers as valid in-bound memory...

Read MoreRead more about CVE-2021-38479
CVE-prog
  • Vulnerabilities

CVE-2021-42106

October 27, 2021

Summary: Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and...

Read MoreRead more about CVE-2021-42106
CVE-prog
  • Vulnerabilities

CVE-2021-30359

October 27, 2021

Summary: The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during...

Read MoreRead more about CVE-2021-30359
CVE-prog
  • Vulnerabilities

CVE-2021-42107

October 27, 2021

Summary: Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and...

Read MoreRead more about CVE-2021-42107
CVE-prog
  • Vulnerabilities

CVE-2021-42108

October 27, 2021

Summary: Unnecessary privilege vulnerabilities in the Web Console of Trend Micro Apex One, Apex One as a Service and Worry-Free...

Read MoreRead more about CVE-2021-42108
osint
  • News

The 9th edition of the ENISA Threat Landscape (ETL) report is out!

October 27, 2021

I’m proud to announce the release of the 9th edition of the ENISA Threat Landscape (ETL) on the state of...

Read MoreRead more about The 9th edition of the ENISA Threat Landscape (ETL) report is out!
osint
  • News

Watch out for the Steam skin “free knife” scam

October 27, 2021

Have you ever had someone run up to you in the street and insist you take their free knife? I...

Read MoreRead more about Watch out for the Steam skin “free knife” scam
osint
  • News

Update now! Apple patches bugs in iOS and iPadOS

October 27, 2021

On two consecutive days Apple has released a few important patches. iOS 14.8.1 comes just a month after releasing iOS...

Read MoreRead more about Update now! Apple patches bugs in iOS and iPadOS
lorsrf_1_lorsrf-792518
  • Tools

Lorsrf – SSRF Parameter Bruteforce

October 27, 2021

Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST MethodsNOTELorsrf has been added to scant3r with useful...

Read MoreRead more about Lorsrf – SSRF Parameter Bruteforce

Posts pagination

Previous 1 … 4,121 4,122 4,123 4,124 4,125 4,126 4,127 … 4,505 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Sellars Absorbent Materials

November 4, 2025
image
  • Data Breach
  • Ransomware

[PAYOUTSKING] – Ransomware Victim: I****r

November 4, 2025
Palo_Alto_Networks_Logo
  • Vulnerabilities

[Palo Alto Networks Security Advisories] PAN-SA-2025-0017 Informational Bulletin: Impact of OSS CVEs in Prisma SD-WAN ION

November 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-48703 – centos-webpanel – CentOS Web Panel

November 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-11371 – Gladinet – CentreStack and TrioFox

November 4, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel