Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
measure-success-vulnerability-management-program
  • News

Redefining How to Measure the Success of Your Vulnerability Management Program

March 18, 2020

Could your team be wasting its time reporting vulnerability metrics that don’t matter? Security teams often fall into the trap...

Read MoreRead more about Redefining How to Measure the Success of Your Vulnerability Management Program
osint
  • News

Foreign APT groups use coronavirus phishing lures to drop RAT malware

March 17, 2020

Each day, as the novel coronavirus multiplies and spreads, so do cyber scams capitalizing on users’ fears and thirst for...

Read MoreRead more about Foreign APT groups use coronavirus phishing lures to drop RAT malware
osint
  • News

Password found to rescue victims of malicious COVID-19 tracker app

March 17, 2020

Members of the IT and cybersecurity communities have successfully obtained a password key for victims of CovidLock Android ransomware, which...

Read MoreRead more about Password found to rescue victims of malicious COVID-19 tracker app
osint
  • News

Lock and Code S1Ep2: On the challenges of managed service providers

March 17, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep2: On the challenges of managed service providers
1-1
  • News

APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT

March 17, 2020

Since the coronavirus became a worldwide health issue, the desire for more information and guidance from government and health authorities...

Read MoreRead more about APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT
office-594132_1280
  • News

Cybersecurity experts told how to protect yourself when working from home

March 17, 2020

After the World Health Organization (WHO) officially recognized the outbreak of COVID-2019 as a pandemic, many employers offered their employees...

Read MoreRead more about Cybersecurity experts told how to protect yourself when working from home
osint
  • News

Hackers take advantage of Coronavirus panic, launch Cyberattacks

March 17, 2020

The whole world is in high alert with coronavirus COVID-19, as being declared a pandemic and every government is making...

Read MoreRead more about Hackers take advantage of Coronavirus panic, launch Cyberattacks
abstract-smartphone-camera-990x400-1
  • News

MonitorMinor: vicious stalkerware

March 17, 2020

The other day, our Android traps ensnared an interesting specimen of stalkerware — commercial software that is usually used to...

Read MoreRead more about MonitorMinor: vicious stalkerware
token-reverser
  • News

Token-Reverser – Word List Generator To Crack Security Tokens

March 17, 2020

Word list generator to crack security tokens.Example use case You are testing reset password function Reset password token was sent...

Read MoreRead more about Token-Reverser – Word List Generator To Crack Security Tokens
shuffledns_5_shuffledns-run
  • News

shuffleDNS – Wrapper Around Massdns Written In Go That Allows You To Enumerate Valid Subdomains

March 17, 2020

shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as...

Read MoreRead more about shuffleDNS – Wrapper Around Massdns Written In Go That Allows You To Enumerate Valid Subdomains
multi-layered-approach-security
  • News

How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach

March 17, 2020

Recently, we interviewed Anthony Edwards, director of security operations for Hilltop Holdings, about how his financial holdings organization approaches multi-level...

Read MoreRead more about How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach
COVID-19-rapid7-communication
  • News

Our Commitment to Keeping Your Organization Secure During COVID-19

March 17, 2020

COVID-19 has created a great deal of concern and uncertainty, and we want to reassure our customers that your security...

Read MoreRead more about Our Commitment to Keeping Your Organization Secure During COVID-19
work-from-home-wfh-digital-self
  • News

How to WFH and Keep Your Digital Self Safe

March 17, 2020

We have rapidly entered a new era of living with a global pandemic. As a result, many are working from...

Read MoreRead more about How to WFH and Keep Your Digital Self Safe
849012-computer
  • News

2 New Android Malwares on The Hunt to Gain Control of User’s Account

March 16, 2020

As per discoveries of competent security software two new Android malware is on the hunt to 'discreetly' access control of...

Read MoreRead more about 2 New Android Malwares on The Hunt to Gain Control of User’s Account
osint
  • News

Google rewards 100,000$ as bug bounty prize!

March 16, 2020

Google has awarded 100,000 dollars prize to a Dutch researcher Wouter ter Maat for the Google Cloud Platform (GCP), for...

Read MoreRead more about Google rewards 100,000$ as bug bounty prize!
AWSGen.py_1_example
  • News

AWSGen.py – Generates Permutations, Alterations And Mutations Of AWS S3 Buckets Names

March 16, 2020

AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names.Download AWSGen.py Original Source

Read MoreRead more about AWSGen.py – Generates Permutations, Alterations And Mutations Of AWS S3 Buckets Names
jeopardize
  • News

Jeopardize – A Low(Zero) Cost Threat Intelligence & Response Tool Against Phishing Domains

March 16, 2020

Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It...

Read MoreRead more about Jeopardize – A Low(Zero) Cost Threat Intelligence & Response Tool Against Phishing Domains
11
  • News

Tor Browser Bug Executes Uncalled for JavaScript Codes!

March 15, 2020

The well-known Tor is allegedly experiencing some kind of bug in its mechanism. It has hence warned the users to...

Read MoreRead more about Tor Browser Bug Executes Uncalled for JavaScript Codes!
tea_1
  • News

TEA – Ssh-Client Worm

March 15, 2020

A ssh-client worm made with tas framework.How it works?This is a fakessh-client that manipulates the tty input/output to execute arbitrary...

Read MoreRead more about TEA – Ssh-Client Worm
zelos_8_hello_zelos
  • News

Zelos – A Comprehensive Binary Emulation Platform

March 15, 2020

Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess...

Read MoreRead more about Zelos – A Comprehensive Binary Emulation Platform
osint
  • News

Russian cybercrime forums seen selling malware-sabotaged COVID-19 map

March 14, 2020

The recently discovered weaponized coronavirus map found to infect victims with a variant of the information-stealing AZORult malware has been...

Read MoreRead more about Russian cybercrime forums seen selling malware-sabotaged COVID-19 map
osint
  • News

Coronavirus tracking app locks up Android phones for ransom

March 14, 2020

A malicious Android app that supposedly helps track cases of the coronavirus actually locks users’ phones and demands a ransom...

Read MoreRead more about Coronavirus tracking app locks up Android phones for ransom
osint
  • News

The effects of climate change on cybersecurity

March 14, 2020

Outside the coronavirus pandemic and its related healthcare and economic fallout, climate change and cybersecurity are seen by many as...

Read MoreRead more about The effects of climate change on cybersecurity
cyber2Bcrime-1
  • News

The prosecutor’s office identified a leak of the full database export and import operations in Russia for eight years

March 14, 2020

Yekaterina Korotkova, the representative of the Moscow Interregional Transport Prosecutor's Office reported that the Northern Transport Prosecutor’s Office revealed a...

Read MoreRead more about The prosecutor’s office identified a leak of the full database export and import operations in Russia for eight years

Posts pagination

Previous 1 … 4,132 4,133 4,134 4,135 4,136 4,137 4,138 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel