Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

PwnedPiper flaws in PTS systems affect 80% of major US hospitals

August 3, 2021

Cybersecurity researchers disclosed multiple flaws, dubbed PwnedPiper, that left a widely-used pneumatic tube system (PTS) vulnerable to attacks. Researchers from...

Read MoreRead more about PwnedPiper flaws in PTS systems affect 80% of major US hospitals
CVE-prog
  • Vulnerabilities

CVE-2021-35516

August 3, 2021

Summary: When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally...

Read MoreRead more about CVE-2021-35516
CVE-prog
  • Vulnerabilities

CVE-2021-35517

August 3, 2021

Summary: When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally...

Read MoreRead more about CVE-2021-35517
CVE-prog
  • Vulnerabilities

CVE-2021-36090

August 3, 2021

Summary: When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally...

Read MoreRead more about CVE-2021-36090
CVE-prog
  • Vulnerabilities

CVE-2020-22283

August 3, 2021

Summary: A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to...

Read MoreRead more about CVE-2020-22283
CVE-prog
  • Vulnerabilities

CVE-2021-1600

August 3, 2021

Summary: Multiple vulnerabilities in Cisco Intersight Virtual Appliance could allow an unauthenticated, adjacent attacker to access sensitive internal services from...

Read MoreRead more about CVE-2021-1600
osint
  • News

A week in security (July 26 – August 1)

August 3, 2021

Last week on Malwarebytes Labs: OSX.XLoader hides little except its main purpose: What we learned in the installation process.The Clubhouse...

Read MoreRead more about A week in security (July 26 – August 1)
jackpotting
  • News

This Vulnerability in E-Learning Platform Moodle Could Even Modify Exam Results

August 3, 2021

 Critical Security Exploit in the popular e learning platform Moodle can be compromised that lets access to student data and...

Read MoreRead more about This Vulnerability in E-Learning Platform Moodle Could Even Modify Exam Results
pexels-tima-miroshnichenko-5380641
  • News

City Officials of Grass Valley Negotiates with the Handlers of Ransomware Attack

August 3, 2021

 The city of Grass Valley is one of the latest victims of a ransomware attack. The operators of the ransomware...

Read MoreRead more about City Officials of Grass Valley Negotiates with the Handlers of Ransomware Attack
code-1839406_1920
  • News

Malevolent PyPI Packages Detected Filching Developer Data

August 3, 2021

 Repositories of software packages have become a frequent target for supply chain attacks. Reports concerning malware attacks on prominent repository...

Read MoreRead more about Malevolent PyPI Packages Detected Filching Developer Data
pexels-photomix-company-218717
  • News

Google Plans to Ban ‘Sugar Dating’ Apps From September

August 3, 2021

 Google is all set to remove ‘Super Dating' applications from the Play Store in order to make the Android app...

Read MoreRead more about Google Plans to Ban ‘Sugar Dating’ Apps From September
hacker-2883632_1920
  • News

Security Researchers Discovered Crimea Manifesto Buried in VBA Rat

August 3, 2021

 On Thursday, Hossein Jazi and the Threat Intelligence team at Malwarebytes released a report revealing a new threat actor that...

Read MoreRead more about Security Researchers Discovered Crimea Manifesto Buried in VBA Rat
domhttpx_7_default-usage-784594
  • Tools

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can Make It Easier For You To Find Many URLs/IPs At Once With Fast Time

August 3, 2021

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to...

Read MoreRead more about Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can Make It Easier For You To Find Many URLs/IPs At Once With Fast Time
PowerShellArmoury_1-793052
  • Tools

PowerShellArmoury – A PowerShell Armoury For Security Guys And Girls

August 3, 2021

The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their...

Read MoreRead more about PowerShellArmoury – A PowerShell Armoury For Security Guys And Girls
osint
  • News

More evidence suggests that DarkSide and BlackMatter are the same group

August 2, 2021

Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. BleepingComputer found evidence that...

Read MoreRead more about More evidence suggests that DarkSide and BlackMatter are the same group
osint
  • News

WordPress Download Manager Plugin was affected by two flaws

August 2, 2021

An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under...

Read MoreRead more about WordPress Download Manager Plugin was affected by two flaws
osint
  • News

Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14

August 2, 2021

The 2021 attacks on two water treatment facilities in the US—combined with ransomware attacks on an oil and gas supplier...

Read MoreRead more about Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14
osint
  • News

Ransomware Attempt Volume Touching Over 300 Million, Sets Record

August 2, 2021

A new investigation report has been published by SonicWall network security organization in which it stated that ransomware attacks have...

Read MoreRead more about Ransomware Attempt Volume Touching Over 300 Million, Sets Record
iphone2B5
  • News

Hacker Uses Credential Phishing to Gain Access Into PayPal Account

August 2, 2021

 Analysts from Cofense Phishing Defense Center recently found a unique PayPal credential phishing attack. Phishing is a harmful technique that...

Read MoreRead more about Hacker Uses Credential Phishing to Gain Access Into PayPal Account
adi-goldstein-EUsVwEOsblE-unsplash
  • News

Exploit Code Released for a Critical Flaw in Linux Kernel eBPF on Ubuntu Machines

August 2, 2021

 Cybersecurity researcher Manfred Paul revealed the details of the code for abusing a critical flaw in the Linux eBPF (Extended...

Read MoreRead more about Exploit Code Released for a Critical Flaw in Linux Kernel eBPF on Ubuntu Machines
malicious-code-4036349_1920
  • News

Russia’s APT29 is Actively Serving WellMess/WellMail Malware

August 2, 2021

 A year ago, the United Kingdom, the USA, and Canada released a coordinated advisory, during the global pandemic, revealing a...

Read MoreRead more about Russia’s APT29 is Actively Serving WellMess/WellMail Malware
pexels-sora-shimazaki-59357942B252822529
  • News

Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings

August 2, 2021

 President Joe Biden's appeal for Vladimir Putin to crack down on cyberattacks emanating from within Russia appears to have failed...

Read MoreRead more about Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings
tsharkVM_1_tshark_vm_dashboard-726339
  • Tools

tsharkVM – Tshark + ELK Analytics Virtual Machine

August 2, 2021

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance...

Read MoreRead more about tsharkVM – Tshark + ELK Analytics Virtual Machine
Disk2BForensics
  • Tools

CSIRT-Collect – PowerShell Script To Collect Memory And (Triage) Disk Forensics

August 2, 2021

A PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a network share,...

Read MoreRead more about CSIRT-Collect – PowerShell Script To Collect Memory And (Triage) Disk Forensics

Posts pagination

Previous 1 … 4,206 4,207 4,208 4,209 4,210 4,211 4,212 … 4,512 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: LaRosa’s Pizzeria

November 7, 2025
image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: PT Kalimantan Prima Persada

November 7, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-36186 – IBM – Db2

November 7, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9458 – Autodesk – Shared Components

November 7, 2025
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: low-privileged-user-can-enable-or-disable-lovable-ai-for-new-projects-in-workspace-anxioussick

November 7, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel