Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
TwitWork_2
  • News

TwitWork – Monitor Twitter Stream

March 5, 2020

Monitor twitter stream.TwitWork use the twitter stream which allows you to have a tweets in real-time.There is an input that...

Read MoreRead more about TwitWork – Monitor Twitter Stream
path-oscp-offensive-security-professional-penetration-pen-testing
  • News

Lessons Learned from an Unlikely Path to My OSCP Certification

March 5, 2020

About one year ago, my colleague Trevor O’Donnal wrote a blog post, “Why a 17-Year Veteran Pen Tester Took the...

Read MoreRead more about Lessons Learned from an Unlikely Path to My OSCP Certification
feature_vul-300x300-200x200-1
  • News

Security Risks in Online Coding Platforms

March 4, 2020

By David Fiser (Senior Cyber Threat Researcher) Threat Modeling for Online Coding Platforms Before cloud integrated development environments (IDEs) became...

Read MoreRead more about Security Risks in Online Coding Platforms
osint
  • News

Child identity theft, part 1: On familiar fraud

March 4, 2020

In 2013, 30-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died....

Read MoreRead more about Child identity theft, part 1: On familiar fraud
social-1206612_960_720
  • News

A vulnerability that Allows Hackers to Hijack Facebook Accounts

March 4, 2020

A cybersecurity expert recently found a vulnerability in FB's "login with the Facebook feature." According to the expert, the vulnerability...

Read MoreRead more about A vulnerability that Allows Hackers to Hijack Facebook Accounts
transcribe_console_1
  • News

Amazon Transcribe Can Automatically Shroud the User’s Personal Information from Call Transcripts?

March 4, 2020

Amazon Transcribe, the AWS-based 'speech-to-text service, recently came up with a significant new feature which, if executed effectively, can spontaneously...

Read MoreRead more about Amazon Transcribe Can Automatically Shroud the User’s Personal Information from Call Transcripts?
22-1
  • News

Windows 10 Users Beware! TrickBots’ Prevalence And Conveyance Escalates in Devices

March 4, 2020

Reports mention that recently attackers were found exploiting the latest version of the “Remote Desktop ActiveX” which was developed for...

Read MoreRead more about Windows 10 Users Beware! TrickBots’ Prevalence And Conveyance Escalates in Devices
XCTR-Hacking-Tools_1
  • News

XCTR Hacking Tools – All in one tools for Information Gathering

March 4, 2020

All in one tools for Information Gathering.Instagram: Capture the RootScreenshotsRead MeInitially, you need to create a project where you will...

Read MoreRead more about XCTR Hacking Tools – All in one tools for Information Gathering
wifi-passview_8_screenshot
  • News

WiFi Passview v2.0 – An Open Source Batch Script Based WiFi Passview For Windows!

March 4, 2020

WiFi Passview is an open source batch script based program that can recover your WiFi Password easily in seconds. This...

Read MoreRead more about WiFi Passview v2.0 – An Open Source Batch Script Based WiFi Passview For Windows!
rapid7-quarterly-threat-report-q1-2020
  • News

Rapid7 2020 Threat Report: Exposing Common Attacker Trends

March 4, 2020

If you joined Rapid7 at RSAC 2020 just a few days ago, you probably caught wind of Rapid7’s end-of-year threat...

Read MoreRead more about Rapid7 2020 Threat Report: Exposing Common Attacker Trends
osint
  • News

Data-stealing ransomware hits parts maker for Tesla, Boeing and Lockheed Martin

March 3, 2020

Visser Precision, a parts maker and manufacturing solutions provider for the aerospace, automotive, industrial and manufacturing industries, has reportedly suffered...

Read MoreRead more about Data-stealing ransomware hits parts maker for Tesla, Boeing and Lockheed Martin
osint
  • News

Lock and Code S1Ep1: On RSA, the human element, and the week in security

March 3, 2020

Last week, we told you we were launching a fortnightly podcast, called Lock and Code. This week, we made good...

Read MoreRead more about Lock and Code S1Ep1: On RSA, the human element, and the week in security
credit-card
  • News

The hacker explained why in Russia cards will become more often blocked

March 3, 2020

Hacker Alexander Warski told what to expect from Governing Bodies. According to him, bank cards will more often be blocked...

Read MoreRead more about The hacker explained why in Russia cards will become more often blocked
dnsFookup_1_create
  • News

dnsFookup – DNS Rebinding Toolkit

March 3, 2020

DNS Rebinding freamwork containing:a dns server obviouslyweb api to create new subdomains and control the dns server, view logs, stuff...

Read MoreRead more about dnsFookup – DNS Rebinding Toolkit
BadBlood_1
  • News

BadBlood – Fills A Microsoft Active Directory Domain With A Structure And Thousands Of Objects

March 3, 2020

BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the...

Read MoreRead more about BadBlood – Fills A Microsoft Active Directory Domain With A Structure And Thousands Of Objects
RSA
  • News

How We Used Data Science Magic to Predict Key RSA 2020 Themes and Takeaways

March 3, 2020

This blog was co-authored by Mark Hamill and Bob Rudis.There’s nothing quite like attending the annual RSA security conference in...

Read MoreRead more about How We Used Data Science Magic to Predict Key RSA 2020 Themes and Takeaways
fraud2Balert
  • News

New Lampion Trojan Found Attacking Portuguese Users

March 2, 2020

There's a new Trojan in town - "The Lampion Trojan", this malware as discovered by security researchers is distributed via...

Read MoreRead more about New Lampion Trojan Found Attacking Portuguese Users
xencrypt_1_bypass
  • News

Xencrypt – A PowerShell Script Anti-Virus Evasion Tool

March 2, 2020

Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn't it...

Read MoreRead more about Xencrypt – A PowerShell Script Anti-Virus Evasion Tool
subfinder_5_subfinder-run
  • News

Subfinder – A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites

March 2, 2020

subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a...

Read MoreRead more about Subfinder – A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites
vpn-4046047_960_720
  • News

Hackers Exploit Vulnerabilities in Pulse VPN and Android Devices to Launch Heavy Cyberattack

March 1, 2020

The vulnerability named CVE-2019-1150 has affected Pulse VPN's network and is regarded as highly 'severe.' Whereas vulnerability named CVE-2019-2215 targets...

Read MoreRead more about Hackers Exploit Vulnerabilities in Pulse VPN and Android Devices to Launch Heavy Cyberattack
osint
  • News

The Russian quality system (Roskachestvo) gave recommendations on protecting data in social networks

March 1, 2020

Scammers in social networks use social engineering techniques to hack a user account. In this regard, Roskachestvo experts recommend setting...

Read MoreRead more about The Russian quality system (Roskachestvo) gave recommendations on protecting data in social networks
AP20031505341481
  • News

Corona Impacts Amazon; More Than One Million Products Banned

March 1, 2020

The e-commerce giant has finally started taking steps to secure against the corona epidemic by banning more than one million...

Read MoreRead more about Corona Impacts Amazon; More Than One Million Products Banned
bubbles-1968275_960_720
  • News

Facebook Sues Data Analytics Firm for Improperly Harvesting User Data

March 1, 2020

On Thursday, Facebook filed a federal lawsuit in California Court against OneAudience, a New Jersey-based marketing firm mainly involved in...

Read MoreRead more about Facebook Sues Data Analytics Firm for Improperly Harvesting User Data
22
  • News

Cyber Flashing- Another Horrendous Way of Sexual Assault Via The Internet!

March 1, 2020

Of all the horrible things a pervert could do using the cyber means, Cyber Flashing is by far the most...

Read MoreRead more about Cyber Flashing- Another Horrendous Way of Sexual Assault Via The Internet!

Posts pagination

Previous 1 … 4,136 4,137 4,138 4,139 4,140 4,141 4,142 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel