Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials: A Practical Roadmap for Modern Infrastructures

August 11, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Scheme flooding fingerprint technique may deanonymize Tor users

May 15, 2021

FingerprintJS experts devised a fingerprinting technique, named scheme flooding, that could allow identifying users across different desktop browsers, including the...

Read MoreRead more about Scheme flooding fingerprint technique may deanonymize Tor users
osint
  • News

Darkside gang lost control of their servers and funds

May 15, 2021

The operators of the Darkside ransomware announced that they have lost control of their infrastructure and part of the funds...

Read MoreRead more about Darkside gang lost control of their servers and funds
CVE-prog
  • Vulnerabilities

CVE-2021-21231

May 15, 2021

Summary: Insufficient data validation in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap...

Read MoreRead more about CVE-2021-21231
CVE-prog
  • Vulnerabilities

CVE-2021-21232

May 15, 2021

Summary: Use after free in Dev Tools in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit...

Read MoreRead more about CVE-2021-21232
CVE-prog
  • Vulnerabilities

CVE-2021-21233

May 15, 2021

Summary: Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 90.0.4430.93 allowed a remote attacker to potentially...

Read MoreRead more about CVE-2021-21233
CVE-prog
  • Vulnerabilities

CVE-2021-29457

May 15, 2021

Summary: Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files....

Read MoreRead more about CVE-2021-29457
CVE-prog
  • Vulnerabilities

CVE-2021-1079

May 15, 2021

Summary: NVIDIA GeForce Experience, all versions prior to 3.22, contains a vulnerability in GameStream plugins where log files are created...

Read MoreRead more about CVE-2021-1079
osint
  • News

Gamers level up with rewards for better security

May 15, 2021

There was a time when stolen gaming accounts were almost treated as a fact of life. Console hacks weren’t taken...

Read MoreRead more about Gamers level up with rewards for better security
captcha-scam-page-1-277x600-1
  • News

iPhone calendar spam attacks on the rise

May 15, 2021

Recently, we have seen an increasing number of reports from iPhone users about their calendars filling up with junk events....

Read MoreRead more about iPhone calendar spam attacks on the rise
whatsapp-1212017_1280
  • News

The expert said that WhatsApp transfer users correspondence to Facebook

May 15, 2021

 Facebook collects the data from users' devices, phones, correspondence and conversation content, photos, calls, movementsMessenger WhatsApp has long been sending...

Read MoreRead more about The expert said that WhatsApp transfer users correspondence to Facebook
florian-olivo-Ek9Znm8lQ1U-unsplash-3
  • News

GasBuddy Jumps to No. 1 on Apple Store After Colonial Pipeline Shutdown

May 15, 2021

 Someone’s loss is someone else’s gain – this proverb perfectly fits in the scenario of GasBuddy. GasBuddy, a popular fueling...

Read MoreRead more about GasBuddy Jumps to No. 1 on Apple Store After Colonial Pipeline Shutdown
pexels-armand-valendez-544295
  • News

Apple’s Find My Network: Can be Abused to Leak Secrets Via Passing Devices

May 15, 2021

 Apple's Find My network, which is used to track iOS and macOS devices – as well as more recently AirTags...

Read MoreRead more about Apple’s Find My Network: Can be Abused to Leak Secrets Via Passing Devices
pexels-sebastiaan-stam-1097456
  • News

FBI – CISA Published a Joint Advisory as Colonial Pipeline Suffers a Catastrophic Ransomware Attack

May 15, 2021

 Following a catastrophic ransomware assault on a Colonial Pipeline, the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA)...

Read MoreRead more about FBI – CISA Published a Joint Advisory as Colonial Pipeline Suffers a Catastrophic Ransomware Attack
building-1011876_1920
  • News

RevengeRAT is Targeting the Aerospace and Travel Sectors with Spear-Phishing Emails

May 15, 2021

 Microsoft has released a warning about a remote access tool (RAT) called RevengeRAT, which it claims has been used to...

Read MoreRead more about RevengeRAT is Targeting the Aerospace and Travel Sectors with Spear-Phishing Emails
mubeng_1
  • Tools

Mubeng – An Incredibly Fast Proxy Checker And IP Rotator With Ease

May 15, 2021

An incredibly fast proxy checker & IP rotator with ease.FeaturesProxy IP rotator: Rotates your IP address for every specific request....

Read MoreRead more about Mubeng – An Incredibly Fast Proxy Checker And IP Rotator With Ease
r77-rootkit_1
  • Tools

R77-Rootkit – Fileless Ring 3 Rootkit With Installer And Persistence That Hides Processes, Files, Network Connections, Etc…

May 15, 2021

Ring 3 rootkitr77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named pipes,...

Read MoreRead more about R77-Rootkit – Fileless Ring 3 Rootkit With Installer And Persistence That Hides Processes, Files, Network Connections, Etc…
osint
  • News

Magecart gang hides PHP-based web shells in favicons

May 14, 2021

Magecart cybercrime gang is using favicon to hide malicious PHP web shells used to maintain remote access to inject JavaScript...

Read MoreRead more about Magecart gang hides PHP-based web shells in favicons
osint
  • News

Ireland’s Health Service Executive hit by ransomware attack

May 14, 2021

Ireland’s Health Service Executive service shut down its IT systems after they were hit with a “significant ransomware attack.” Another major...

Read MoreRead more about Ireland’s Health Service Executive hit by ransomware attack
osint
  • News

Colonial Pipeline likely paid a $5M ransom to DarkSide

May 14, 2021

DarkSide demanded a $5 million ransom to Colonial Pipeline, which has quickly recovered operations, did it pay? The Colonial Pipeline...

Read MoreRead more about Colonial Pipeline likely paid a $5M ransom to DarkSide
osint
  • News

Rapid7 says source code, credentials accessed as a result of Codecov supply-chain attack

May 14, 2021

Rapid7 disclosed that unauthorized third-party had access to source code and customer data as result of Codecov supply chain attack....

Read MoreRead more about Rapid7 says source code, credentials accessed as a result of Codecov supply-chain attack
osint
  • News

Security at Bay: Critical Infrastructure Under Attack

May 14, 2021

The recent Colonial Pipeline attack highlights the dangers that are facing Critical Infrastructure worldwide. The attack perpetrated by hackers on...

Read MoreRead more about Security at Bay: Critical Infrastructure Under Attack
osint
  • News

Please vote Security Affairs – 1 day left

May 14, 2021

Hi GuysI need your support. I became aware only not that we can nominate SecurityAffairs as Best Personal Blog. I...

Read MoreRead more about Please vote Security Affairs – 1 day left
CVE-prog
  • Vulnerabilities

CVE-2021-31165

May 14, 2021

Summary: Windows Container Manager Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31167, CVE-2021-31168, CVE-2021-31169, CVE-2021-31208. Reference...

Read MoreRead more about CVE-2021-31165
CVE-prog
  • Vulnerabilities

CVE-2021-31170

May 14, 2021

Summary: Windows Graphics Component Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31188. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31170 https://www.zerodayinitiative.com/advisories/ZDI-21-578/...

Read MoreRead more about CVE-2021-31170

Posts pagination

Previous 1 … 4,131 4,132 4,133 4,134 4,135 4,136 4,137 … 4,372 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

900fb44bd057ef183973abf48cd76e5ab83d00169a6d0f2eaaf302c0e9f2deaf
  • News

Fydeos Offers Chromeos Without The Google Strings Attached

August 23, 2025
c67ac36ce7913ed1f58d4ecd5592205cee683500c3a61b5db2878da13e3d970f
  • News

Interpol Bags 1,209 Suspects, $97m In Cybercrime Operation Focused On Africa

August 23, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: www[.]ecodemolizionisrl[.]com

August 23, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 1[.]15[.]25[.]148:9080

August 23, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 83[.]229[.]122[.]83:443

August 23, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel