Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
virtual-reality-4490469_1280
  • News

Russia has developed a virtual reality helmet for recruitment

August 14, 2021

Researchers from Samara State University have developed a technology to assess the psychological qualities of a job seeker using a...

Read MoreRead more about Russia has developed a virtual reality helmet for recruitment
pexels-tima-miroshnichenko-5380641-2
  • News

Underground Criminals Selling Stolen Network Access to Third Parties for up to $10,000

August 14, 2021

 Cybersecurity firm Intsights published a new report that highlights the vibrant marketplaces on the dark web where attackers can buy...

Read MoreRead more about Underground Criminals Selling Stolen Network Access to Third Parties for up to $10,000
pexels-pixabay-38275
  • News

Cyber Firm: Ransomware Group Demanding $50M in Accenture Security Breach

August 14, 2021

 The hacking group behind a ransomware attack on global solution provider powerhouse Accenture has demanded $50 million in ransom, as...

Read MoreRead more about Cyber Firm: Ransomware Group Demanding $50M in Accenture Security Breach
surgery-1822458_1920
  • News

St. Joseph’s/Candler (SJ/C) Suffered a Data Breach

August 14, 2021

 A ransomware attack on one of the leading healthcare organizations in southeast Georgia compromised personnel and patients' protected health information...

Read MoreRead more about St. Joseph’s/Candler (SJ/C) Suffered a Data Breach
Nimplant
  • Tools

Nimplant – A Cross-Platform Implant Written In Nim

August 14, 2021

Nimplant is a cross-platform (Linux & Windows) implant written in Nim as a fun project to learn about Nim and...

Read MoreRead more about Nimplant – A Cross-Platform Implant Written In Nim
jwt-crack
  • Tools

jwtXploiter – A Tool To Test Security Of Json Web Token

August 14, 2021

A tool to test security of JSON Web Tokens. Test a JWT against all known CVEs; Tamper with the token...

Read MoreRead more about jwtXploiter – A Tool To Test Security Of Json Web Token
osint
  • News

Google open-sourced Allstar tool to secure GitHub repositories

August 13, 2021

Google has open-sourced the Allstar tool that can be used to secure GitHub projects and prevent security misconfigurations. Google has open-sourced the Allstar tool...

Read MoreRead more about Google open-sourced Allstar tool to secure GitHub repositories
osint
  • News

Microsoft warns of a evasive year-long spear-phishing campaign targeting Office 365 users

August 13, 2021

Microsoft warns of a long-running spear-phishing campaign that has targeted Office 365 customers in multiple attacks since July 2020. Microsoft...

Read MoreRead more about Microsoft warns of a evasive year-long spear-phishing campaign targeting Office 365 users
osint
  • News

Trend Micro warns customers of zero-day attacks against its products

August 13, 2021

Security firms Trend Micro is warning its customers of attacks exploiting zero-day vulnerabilities in its Apex One and Apex One...

Read MoreRead more about Trend Micro warns customers of zero-day attacks against its products
CVE-prog
  • Vulnerabilities

CVE-2020-7863

August 13, 2021

Summary: A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a...

Read MoreRead more about CVE-2020-7863
CVE-prog
  • Vulnerabilities

CVE-2021-32794

August 13, 2021

Summary: ArchiSteamFarm is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a...

Read MoreRead more about CVE-2021-32794
CVE-prog
  • Vulnerabilities

CVE-2021-37553

August 13, 2021

Summary: In JetBrains YouTrack before 2021.2.16363, an insecure PRNG was used. Reference Links(if available): https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/ CVSS Score (if available) v2:...

Read MoreRead more about CVE-2021-37553
CVE-prog
  • Vulnerabilities

CVE-2018-13844

August 13, 2021

Summary: ** DISPUTED ** An issue has been found in HTSlib 1.8. It is a memory leak in fai_read in...

Read MoreRead more about CVE-2018-13844
CVE-prog
  • Vulnerabilities

CVE-2021-22517

August 13, 2021

Summary: A potential unauthorized privilege escalation vulnerability has been identified in Micro Focus Data Protector. The vulnerability affects versions 10.10,...

Read MoreRead more about CVE-2021-22517
osint
  • News

Microsoft’s PrintNightmare continues, shrugs off Patch Tuesday fixes

August 13, 2021

I doubt if there has ever been a more appropriate nickname for a vulnerable service than PrintNightmare. There must be...

Read MoreRead more about Microsoft’s PrintNightmare continues, shrugs off Patch Tuesday fixes
quantum-physics-4550602_1280
  • News

Russian scientists have launched the first quantum network with open access in Moscow

August 13, 2021

 Russian scientists have launched in Moscow the first quantum network with open access, in which all interested organizations will be...

Read MoreRead more about Russian scientists have launched the first quantum network with open access in Moscow
shahadat-rahman-BfrQnKBulYQ-unsplash-2
  • News

Crytek Confirms Data Theft After Egregor Ransomware Attack

August 13, 2021

 German game developer and publisher Crytek has accepted that its encrypted systems containing customers’ private details were breached by a...

Read MoreRead more about Crytek Confirms Data Theft After Egregor Ransomware Attack
ransomware-5231739_19202B252812529
  • News

Master Key for Decryption of Kaseya, Leaked on Hacking Forum

August 13, 2021

 The universal decryption key for Kaseya has been leaked on a Russian hacking forum by hackers. An Ekranoplan-named user shared...

Read MoreRead more about Master Key for Decryption of Kaseya, Leaked on Hacking Forum
pexels-markus-spiske-10894382B252842529
  • News

Conti Group Exploited Vulnerable Microsoft Exchange Servers

August 13, 2021

 According to cybersecurity consultancy firm Pondurance, the Conti ransomware gang is now using backdoors that are still active. On-premises Microsoft...

Read MoreRead more about Conti Group Exploited Vulnerable Microsoft Exchange Servers
building-1011876_1920
  • News

Microsoft Released Security Updates that Block PetitPotam NTLM Relay Attacks

August 13, 2021

 The PetitPotam NTLM relay exploit, which allows a threat actor to take over a Windows domain, has been blocked by...

Read MoreRead more about Microsoft Released Security Updates that Block PetitPotam NTLM Relay Attacks
abstract_malware_report-990x400-3
  • News

IT threat evolution Q2 2021

August 13, 2021

Targeted attacks The leap of a Cycldek-related threat actor It is quite common for Chinese-speaking threat actors to share tools...

Read MoreRead more about IT threat evolution Q2 2021
abstract_malware_report-990x400-2
  • News

IT threat evolution in Q2 2021. Mobile statistics

August 13, 2021

These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Quarterly...

Read MoreRead more about IT threat evolution in Q2 2021. Mobile statistics
abstract_malware_report-990x400-1
  • News

IT threat evolution in Q2 2021. PC statistics

August 13, 2021

These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Quarterly...

Read MoreRead more about IT threat evolution in Q2 2021. PC statistics
http-request-smuggling_1_thumbnail-753652
  • Tools

Http-Request-Smuggling – HTTP Request Smuggling Detection Tool

August 13, 2021

HTTP request smuggling is a high severity vulnerability which is a technique where an attacker smuggles an ambiguous HTTP request...

Read MoreRead more about Http-Request-Smuggling – HTTP Request Smuggling Detection Tool

Posts pagination

Previous 1 … 4,197 4,198 4,199 4,200 4,201 4,202 4,203 … 4,511 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Rex-Hide

November 7, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4519 – themeatelier – IDonate – Blood Donation, Request And Donor Management System

November 7, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5483 – niaj – Connector Wizard (formerly LC Wizard)

November 7, 2025
image
  • Data Breach
  • Ransomware

[STORMOUS] – Ransomware Victim: www[.]marjane[.]ma

November 7, 2025
HIBP-Banner-1
  • Data Breach

Synthient Credential Stuffing Threat Data – 1,957,476,021 breached accounts

November 7, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel