Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials: A Practical Roadmap for Modern Infrastructures

August 11, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

4 things you should know about testing AV software with VirusTotal’s free online multiscanner

May 19, 2021

As COVID-19 soldiers on, small and medium-size businesses now feel as ripe for malware attacks as deep-pocketed multinationals. SMBs see...

Read MoreRead more about 4 things you should know about testing AV software with VirusTotal’s free online multiscanner
trojanbizarrodetect-600x141-1
  • News

Bizarro: a banking Trojan full of nasty tricks

May 19, 2021

Researchers have discovered a new banking Trojan that has been found targeting customers of European and South American banks. They...

Read MoreRead more about Bizarro: a banking Trojan full of nasty tricks
special-forces-2786680_1280
  • News

The National Security and Defense Council of Ukraine announced the imminent creation of cyber forces in the country

May 19, 2021

Secretary of the National Security and Defense Council (NSDC) Alexey Danilov said that in the near future, President of Ukraine...

Read MoreRead more about The National Security and Defense Council of Ukraine announced the imminent creation of cyber forces in the country
pexels-pixabay-158826-1
  • News

Chipmaker AMD Discover Two New Flaws Against its SEV Techonology

May 19, 2021

 The chipmaker AMD published guidelines for two new attacks (CVE-2020-12967, CVE-2021-26311) against its SEV (Secure Encrypted Virtualization) technology that protects...

Read MoreRead more about Chipmaker AMD Discover Two New Flaws Against its SEV Techonology
pexels-karolina-grabowska-5239803
  • News

Herff Jones Credit Card Breach: College Students Across the US Affected

May 19, 2021

 Graduating students from many universities in the United States have reported fraudulent transactions after using payment cards at Herff Jones,...

Read MoreRead more about Herff Jones Credit Card Breach: College Students Across the US Affected
michael-geiger-JJPqavJBy_k-unsplash
  • News

Computer Servers go down at Clark County

May 19, 2021

 An inquiry is ongoing following a malware operation that led all government Clark County computer servers to go down on...

Read MoreRead more about Computer Servers go down at Clark County
brazil-1542335_1920
  • News

Brazilian Cybercriminals Created Fake Accounts for Uber, Lyft and DoorDash

May 19, 2021

 According to a recent report by the Federal Bureau of Investigation (FBI), a Brazilian organization is planning to defraud users...

Read MoreRead more about Brazilian Cybercriminals Created Fake Accounts for Uber, Lyft and DoorDash
msldap_2
  • Tools

Msldap – LDAP Library For Auditing MS AD

May 19, 2021

msldapLDAP library for MS AD DocumentationAwesome documentation here! FeaturesComes with a built-in console LDAP client All parameters can be conrolled...

Read MoreRead more about Msldap – LDAP Library For Auditing MS AD
mediator_1_mediator
  • Tools

Mediator – An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture

May 19, 2021

Mediator is an end-to-end encrypted reverse shell in which the operator and the shell connect to a "mediator" server that...

Read MoreRead more about Mediator – An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture
osint
  • News

Analysis of NoCry ransomware: A variant of the Judge ransomware

May 18, 2021

Researchers at Tesorion released a decryptor for Judge ransomware that also decrypts files encrypted by the NoCry ransomware. In January...

Read MoreRead more about Analysis of NoCry ransomware: A variant of the Judge ransomware
1f609-1-1
  • News

Discovery of Simps Botnet Leads To Ties to Keksec Group

May 18, 2021

Uptycs’ threat research team discovered a new botnet, tracked as Simps botnet, attributed to Keksec group, which is focused on...

Read MoreRead more about Discovery of Simps Botnet Leads To Ties to Keksec Group
osint
  • News

Bizarro banking Trojan targets banks in Brazil and abroad

May 18, 2021

Bizarro is a new sophisticated Brazilian banking trojan that is targeting customers of tens of banks in Europe and South...

Read MoreRead more about Bizarro banking Trojan targets banks in Brazil and abroad
CVE-prog
  • Vulnerabilities

CVE-2021-31899

May 18, 2021

Summary: In JetBrains Code With Me bundled to the compatible IDEs before version 2021.1, the client could execute code in...

Read MoreRead more about CVE-2021-31899
CVE-prog
  • Vulnerabilities

CVE-2021-31793

May 18, 2021

Summary: An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and...

Read MoreRead more about CVE-2021-31793
CVE-prog
  • Vulnerabilities

CVE-2021-31411

May 18, 2021

Summary: Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2),...

Read MoreRead more about CVE-2021-31411
CVE-prog
  • Vulnerabilities

CVE-2018-10811

May 18, 2021

Summary: strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable. Reference Links(if available):...

Read MoreRead more about CVE-2018-10811
CVE-prog
  • Vulnerabilities

CVE-2021-29607

May 18, 2021

Summary: TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseAdd` results in allowing attackers to...

Read MoreRead more about CVE-2021-29607
pexels-tima-miroshnichenko-5380641-2
  • News

What Cybercriminals Do with Your Personal Information? Here’s How to Defend

May 18, 2021

 We all know that data breach is a major issue that can cause devastating damage to organizations and individuals, but...

Read MoreRead more about What Cybercriminals Do with Your Personal Information? Here’s How to Defend
pexels-pixabay-315788
  • News

Trust Wallet & MetaMask Crypto Wallets: Targeted by New Support Scam

May 18, 2021

 Users of Trust Wallet and MetaMask wallets are the targets of ongoing malicious Twitter phishing attacks aimed at stealing cryptocurrency...

Read MoreRead more about Trust Wallet & MetaMask Crypto Wallets: Targeted by New Support Scam
technology-6233022_1280
  • News

Information security exercises will be held at five cyber polygons in Russia

May 18, 2021

Russian President Vladimir Putin has set the task of digital transformation of key sectors of the economy. Therefore, to protect...

Read MoreRead more about Information security exercises will be held at five cyber polygons in Russia
ransomware-2318381_1920
  • News

Ransomware Attacks Growing at a Fast Rate

May 18, 2021

 Ransomware has become a burning concern to every office in the world which wasn't even existing 30 years before. Probably...

Read MoreRead more about Ransomware Attacks Growing at a Fast Rate
google-76517_1280
  • News

Google and Mozilla Develop an API for HTML Sanitization

May 18, 2021

 Google, Mozilla, and Cure53 engineers have collaborated to create an application programming interface (API) that offers a comprehensive solution to...

Read MoreRead more about Google and Mozilla Develop an API for HTML Sanitization
abstract_money_digitalization-990x400-1
  • News

Bizarro banking Trojan expands its attacks to Europe

May 18, 2021

Bizarro is yet another banking Trojan family originating from Brazil that is now found in other regions of the world....

Read MoreRead more about Bizarro banking Trojan expands its attacks to Europe
corsair_scan_7_corsair_scan
  • Tools

Corsair_Scan – A Security Tool To Test Cross-Origin Resource Sharing (CORS)

May 18, 2021

Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS) misconfigurations. CORS is a mechanism that allows restricted resources...

Read MoreRead more about Corsair_Scan – A Security Tool To Test Cross-Origin Resource Sharing (CORS)

Posts pagination

Previous 1 … 4,127 4,128 4,129 4,130 4,131 4,132 4,133 … 4,371 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

150fbaf1dbbba721d1b05da5a57c8261bd7fdb70e0dc717af6bdcdebd33ee7e5
  • News

Colt Changes Tune, Admits Data Theft As Warlock Gang Begins Auction

August 22, 2025
2a331f30d6ee9a19a841eab89d3edce7b8884f7b9d5a8ab417f1c7d7ff96918d
  • News

Ai Crawlers And Fetchers Are Blowing Up Websites, With Meta And Openai The Worstoffenders

August 22, 2025
d5b576ce7c0d97053f9634f0897f2127464ad9d086c056576a81caf41bcd4e16
  • News

Opinionated Arch Derivative Cachyos Overtakes Mint And Mx On Distrowatch

August 22, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 193[.]187[.]132[.]149:443

August 22, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel