Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Deepfakes laws and proposals flood US

January 24, 2020

In a rare example of legislative haste, roughly one dozen state and federal bills were introduced in the past 12...

Read MoreRead more about Deepfakes laws and proposals flood US
5e2820fd24306a5b00038692
  • News

Amazon Chief’s Phone Hacked by the Saudi Arab Crown Prince

January 24, 2020

Referring to anonymous sources, a British daily newspaper came up with reports on details regarding Amazon Chief Jeff Bezos' cell...

Read MoreRead more about Amazon Chief’s Phone Hacked by the Saudi Arab Crown Prince
cyber2Bsecurity
  • News

Russian Bank reminds about the danger of transferring personal data to someone

January 24, 2020

Transferring personal data to someone (details of cards and accounts, passport data), you can become a victim of cyber fraud,...

Read MoreRead more about Russian Bank reminds about the danger of transferring personal data to someone
card-3663597_960_720
  • News

Canadian Teenager Charged and Arrested for $50 Million Cryptocurrency Theft

January 24, 2020

Samy Bensaci, an 18-year-old teenager from Montreal, Canada has been indicted for 4 criminal charges in relation to a theft...

Read MoreRead more about Canadian Teenager Charged and Arrested for $50 Million Cryptocurrency Theft
abstract-complucter-990x400-1
  • News

Shlayer Trojan attacks one in ten macOS users

January 24, 2020

For close to two years now, the Shlayer Trojan has been the most common threat on the macOS platform: in...

Read MoreRead more about Shlayer Trojan attacks one in ten macOS users
SharpStat_1
  • News

SharpStat – C# Utility That Uses WMI To Run “cmd.exe /c netstat -n”, Save The Output To A File, Then Use SMB To Read And Delete The File Remotely

January 24, 2020

C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB...

Read MoreRead more about SharpStat – C# Utility That Uses WMI To Run “cmd.exe /c netstat -n”, Save The Output To A File, Then Use SMB To Read And Delete The File Remotely
KsDumper_1
  • News

KsDumper – Dumping Processes Using The Power Of Kernel Space

January 24, 2020

I always had an interest in reverse engineering. A few days ago I wanted to look at some game internals...

Read MoreRead more about KsDumper – Dumping Processes Using The Power Of Kernel Space
insight-connect-bmc-plugin-blog-rapid7
  • News

Discover the New BMC Remedy ITSM Plugin for InsightConnect

January 24, 2020

In any IT environment, documentation of work performed by IT is critical and necessary to maintain order when providing resolutions...

Read MoreRead more about Discover the New BMC Remedy ITSM Plugin for InsightConnect
osint
  • News

Malware redirecting visitors found on 2,000 WordPress sites

January 23, 2020

More than 2,000 WordPress sites have been infected with malicious JavaScript that redirects visitors to scam websites and sets the...

Read MoreRead more about Malware redirecting visitors found on 2,000 WordPress sites
ecosystem_
  • News

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

January 23, 2020

In the early days, practically all tech support scammers would get their own leads by doing some amateur SEO poisoning...

Read MoreRead more about WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation
14
  • News

Cyber Attack Alert! A Fake Factory Network Attacked With RAT, Ransomware, Malware and So On!

January 23, 2020

Researchers simulated a real-looking “Industrial prototyping” organization with fake employees, PLCs, and websites to study the types of cyber-attacks that...

Read MoreRead more about Cyber Attack Alert! A Fake Factory Network Attacked With RAT, Ransomware, Malware and So On!
yara-logo
  • News

YARASAFE – Automatic Binary Function Similarity Checks with Yara

January 23, 2020

SAFE is a tool developed to create Binary Functions Embedding developed by Massarelli L., Di Luna G.A., Petroni F., Querzoni...

Read MoreRead more about YARASAFE – Automatic Binary Function Similarity Checks with Yara
AlertResponder_1
  • News

AlertResponder – Automatic Security Alert Response Framework By AWS Serverless Application Model

January 23, 2020

AlertResponder is a serverless framework for automatic response of security alert.OverviewAlertResponder receives an alert that is event of interest from...

Read MoreRead more about AlertResponder – Automatic Security Alert Response Framework By AWS Serverless Application Model
vulnerability-management-cloud-aws-rapid7
  • News

Vulnerability Management in the Cloud: Addressing the AWS Shared Responsibility Model

January 23, 2020

If you’re operating in the cloud, you may be familiar with the shared responsibility model. We often hear people say...

Read MoreRead more about Vulnerability Management in the Cloud: Addressing the AWS Shared Responsibility Model
cyber-4610993_1280
  • News

More than half of Russian companies are concerned about the protection of personal data of employees and customers

January 22, 2020

The antivirus company ESET studied the state of information security in the Russian business sector, interviewing dozens of IT Directors...

Read MoreRead more about More than half of Russian companies are concerned about the protection of personal data of employees and customers
tas_1_generic-keylogger
  • News

TAS – A Tiny Framework For Easily Manipulate The Tty And Create Fake Binaries

January 22, 2020

A tiny framework for easily manipulate the tty and create fake binaries.How it works?The framework has three main functions, tas_execv,...

Read MoreRead more about TAS – A Tiny Framework For Easily Manipulate The Tty And Create Fake Binaries
Corsy_4
  • News

Corsy v1.0 – CORS Misconfiguration Scanner

January 22, 2020

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations.RequirementsCorsy only works with Python 3 and...

Read MoreRead more about Corsy v1.0 – CORS Misconfiguration Scanner
collaboration-vulnerability-remediation-security-it-devops-teams-rapid7
  • News

Better Together: How to Collaborate to Drive Vulnerability Remediation Among Security, IT, and DevOps Teams

January 22, 2020

If you feel anxious about the amount of time it takes your organization to remediate vulnerabilities or find yourself spending...

Read MoreRead more about Better Together: How to Collaborate to Drive Vulnerability Remediation Among Security, IT, and DevOps Teams
osint
  • News

A week in security (January 13 – 19)

January 21, 2020

Last week on Malwarebytes Labs, we taught you how to prevent a rootkit attack, explained what data enrichment means, informed...

Read MoreRead more about A week in security (January 13 – 19)
crime-4512294_960_720
  • News

Railway Protection Force (RPF) bust a multi-crore ticket fraud

January 21, 2020

Bengaluru: The Railway Protection Force busted a multi crore ticket booking fraud and apprehended two miscreants who hacked the railway...

Read MoreRead more about Railway Protection Force (RPF) bust a multi-crore ticket fraud
Google-Maps-Data
  • News

Google Maps…Creepy or Useful?

January 21, 2020

Whether Android or iPhone there is no denying that Google is there for all of us, keeping a track log...

Read MoreRead more about Google Maps…Creepy or Useful?
macbook-3777665_1280
  • News

Bot List Containing Telnet Credentials for More than 500,000 Servers, Routers and IoT Devices Leaked Online

January 21, 2020

This week, a hacker published a list on a popular hacking forum containing Telnet credentials for over 515,000 servers, home...

Read MoreRead more about Bot List Containing Telnet Credentials for More than 500,000 Servers, Routers and IoT Devices Leaked Online
13
  • News

Website Puts 12 Billion User Records Up For Sale and Gets Seized By US Authorities

January 21, 2020

Are you fond of buying stolen'/leaked data? Because, one such domain, named ‘WeLeakInfo.com’ recently got seized by the US authorities....

Read MoreRead more about Website Puts 12 Billion User Records Up For Sale and Gets Seized By US Authorities
TeleGram-Scraper_1_20191203_205322
  • News

TeleGram-Scraper – Telegram Group Scraper Tool (Fetch All Information About Group Members)

January 21, 2020

Telegram Group Scraper Tool. Fetch All Information About Group Members• How To Install & Setup API ( Termux )• API...

Read MoreRead more about TeleGram-Scraper – Telegram Group Scraper Tool (Fetch All Information About Group Members)

Posts pagination

Previous 1 … 4,147 4,148 4,149 4,150 4,151 4,152 4,153 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel