Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Metamofo banking malware spreads around the world

February 8, 2020

A new variant of the Metamorfo banking malware is on the loose targeting a wider range of financial institutions than...

Read MoreRead more about Metamofo banking malware spreads around the world
osint
  • News

Google Maps: online interventions with offline ramifications

February 8, 2020

The places where online life directly intersection with that lived offline will be forever fascinating, illustrated perfectly through a recent...

Read MoreRead more about Google Maps: online interventions with offline ramifications
maxresdefault
  • News

Clause Addition to the IT Act; Social Media Companies Now Responsible For All Nonuser Generated Content

February 8, 2020

What expedited the change was an issue that occurred in the previous year a disagreement regarding content between social media...

Read MoreRead more about Clause Addition to the IT Act; Social Media Companies Now Responsible For All Nonuser Generated Content
pexels-photo-259200
  • News

Banking Trojan ‘Metamorfo’ Now Targeting Online Users’ Banking Services

February 8, 2020

Online banking users are being targeted by a trojan malware campaign going around the globe with the agenda of gaining...

Read MoreRead more about Banking Trojan ‘Metamorfo’ Now Targeting Online Users’ Banking Services
abstractpicture9990897-990x400-1
  • News

Happy New Fear! Gift-wrapped spam and phishing

February 8, 2020

Pre-holiday spam Easy money In the run-up to Christmas and New Year, scam е-mails mentioning easy pickings, lottery winnings, and...

Read MoreRead more about Happy New Fear! Gift-wrapped spam and phishing
SEcraper_1_secraper-showcase
  • News

SEcraper – Search Engine Scraper Tool With BASH Script.

February 8, 2020

Search engine scraper tool with BASH script.Dependencycurl (cli)Available search engineAsk.comSearch.yahoo.comBing.comInstallationgit clone https://github.com/zerobyte-id/SEcraper.gitcd SEcraper/Runbash secraper.bash "QUERY"Download SEcraper Original Source

Read MoreRead more about SEcraper – Search Engine Scraper Tool With BASH Script.
Re2Pcap_3_re2pcap
  • News

Re2Pcap – Create PCAP file from raw HTTP request or response in seconds

February 8, 2020

Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using Re2Pcap and test them against...

Read MoreRead more about Re2Pcap – Create PCAP file from raw HTTP request or response in seconds
Vuln
  • News

Rapid7 Analysis and Guidance: CDPwn (CVE-2020-3118)

February 8, 2020

Note: There are five different CVEs associated with the CDPwn vulnerability group. Each of them targets a different class of...

Read MoreRead more about Rapid7 Analysis and Guidance: CDPwn (CVE-2020-3118)
alsoadmin-600x75-1
  • News

Adposhel adware takes over browser push notifications administration

February 7, 2020

Since late last year, our researchers have been monitoring new methods being deployed by cybercriminals to potentially abuse browser push...

Read MoreRead more about Adposhel adware takes over browser push notifications administration
refuel
  • News

Group of 10 hackers was convicted for stealing gasoline and selling

February 7, 2020

The court issued a verdict on February 3 in the case of theft of fuel at Rosneft gas stations.The court...

Read MoreRead more about Group of 10 hackers was convicted for stealing gasoline and selling
123
  • News

120 Million Medical Records Leaked! Global Medical Report Sheds More Light.

February 7, 2020

Along with cyber-security within your phones and other devices, you must make sure the hospital you go to has enough...

Read MoreRead more about 120 Million Medical Records Leaked! Global Medical Report Sheds More Light.
takeover_1
  • News

Takeover v0.2 – Sub-Domain TakeOver Vulnerability Scanner

February 7, 2020

Sub-domain takeover vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed...

Read MoreRead more about Takeover v0.2 – Sub-Domain TakeOver Vulnerability Scanner
misp-dashboard_1_dashboard-live
  • News

Misp-Dashboard – A Dashboard For A Real-Time Overview Of Threat Intelligence From MISP Instances

February 7, 2020

A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can...

Read MoreRead more about Misp-Dashboard – A Dashboard For A Real-Time Overview Of Threat Intelligence From MISP Instances
three-3-questions-infosec-security-program-rapid7
  • News

3 Questions to Ask Yourself When Justifying Your Infosec Program

February 7, 2020

On the Rapid7 Labs team, we’re constantly looking for ways to give defenders a boost in the work they need...

Read MoreRead more about 3 Questions to Ask Yourself When Justifying Your Infosec Program
Mobile-200x125-1
  • News

Malicious Optimizer and Utility Android Apps on Google Play Communicate with Trojans that Install Malware, Perform Mobile Ad Fraud

February 6, 2020

By Lorin Wu (Mobile Threats Analyst) We recently discovered several malicious optimizer, booster, and utility apps (detected by Trend Micro...

Read MoreRead more about Malicious Optimizer and Utility Android Apps on Google Play Communicate with Trojans that Install Malware, Perform Mobile Ad Fraud
osint
  • News

Cybercriminals abuse Bitbucket to infect users with potpourri of malware

February 6, 2020

A newly discovered attack campaign has been abusing the online storage platform Bitbucket to maintain and update a wide assortment...

Read MoreRead more about Cybercriminals abuse Bitbucket to infect users with potpourri of malware
shutterstock_401964952-600x400-1
  • News

Fintech security: the challenges and fails of a new era

February 6, 2020

“I have no idea how this app from my bank works, and I don’t trust what I don’t understand.” Josh...

Read MoreRead more about Fintech security: the challenges and fails of a new era
computer-1895383_960_720
  • News

Teenager Arrested for DDoS Attack in Ukraine

February 6, 2020

Ukranian Police arrested a 16 yrs old teenager last month on charges of attacking a local Internet Service Provider (ISP)...

Read MoreRead more about Teenager Arrested for DDoS Attack in Ukraine
osint
  • News

Apple Engineers unveils a proposal to standardize the two factor authentication process and Google backs it up!

February 6, 2020

Apple known for it's off the charts security features was recently troubled with hacks, malware and phishing attacks staining its...

Read MoreRead more about Apple Engineers unveils a proposal to standardize the two factor authentication process and Google backs it up!
jaeles_5_jaeles-architecture
  • News

Jaeles v0.4 – The Swiss Army Knife For Automated Web Application Testing

February 6, 2020

Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.InstallationDownload precompiled...

Read MoreRead more about Jaeles v0.4 – The Swiss Army Knife For Automated Web Application Testing
dufflebag_1_1_create_environment
  • News

Dufflebag – Search Exposed EBS Volumes For Secrets

February 6, 2020

Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally...

Read MoreRead more about Dufflebag – Search Exposed EBS Volumes For Secrets
identify-prioritize-remediate-vulnerabilities-cloud
  • News

How to Identify, Prioritize and Remediate Vulnerabilities in the Cloud

February 6, 2020

In part one of our four-part series on security in the cloud, we discussed the AWS shared responsibility model and...

Read MoreRead more about How to Identify, Prioritize and Remediate Vulnerabilities in the Cloud
osint
  • News

Washington Privacy Act welcomed by corporate and nonprofit actors

February 5, 2020

The steady parade of US data privacy legislation continued last month in Washington with the introduction of an improved bill...

Read MoreRead more about Washington Privacy Act welcomed by corporate and nonprofit actors
cyber2Bcrime
  • News

The Prosecutor General’s Office of the Russian Federation proposes to create a single resource to combat cyber fraud

February 5, 2020

Specialized service for collecting data on cybercrime in the financial sector, which will help counteract fraud in cyberspace, may appear...

Read MoreRead more about The Prosecutor General’s Office of the Russian Federation proposes to create a single resource to combat cyber fraud

Posts pagination

Previous 1 … 4,143 4,144 4,145 4,146 4,147 4,148 4,149 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel