Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025
unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
unicorn-300x262-1
  • News

Securing the MSP: best practices for vetting cybersecurity vendors

March 12, 2020

Ironically, to keep costs low for their enterprise and mid-market clients, managed service providers (MSPs) are some of the most...

Read MoreRead more about Securing the MSP: best practices for vetting cybersecurity vendors
hacker2Bidentity2Btheft
  • News

The FBI arrested a Russian associated with Deer.io

March 12, 2020

The Federal Bureau of Investigation arrested a Russian citizen who allegedly supported the sale of hacked accounts and personal data...

Read MoreRead more about The FBI arrested a Russian associated with Deer.io
osint
  • News

Microsoft shuts down World’s Largest Botnet Army

March 12, 2020

According to Microsoft, the company was part of a team that took down the global network of zombie bots. Necurs...

Read MoreRead more about Microsoft shuts down World’s Largest Botnet Army
picture1
  • News

A Module-Based Malware Spread by Word Document

March 12, 2020

As a module-based malware, Trickbot a malware family previously captured by FortiGuard Labs and afterward analyzed in 2016. It can...

Read MoreRead more about A Module-Based Malware Spread by Word Document
arrow-1773951_960_720
  • News

Google Stops Displaying Security Warnings in Microsoft Edge, No Longer Recommends Switching to Chrome

March 12, 2020

Google has stopped advising Microsoft Edge users to switch to Chrome for a more secure experience as the browser extensions...

Read MoreRead more about Google Stops Displaying Security Warnings in Microsoft Edge, No Longer Recommends Switching to Chrome
RedRabbit_1
  • News

RedRabbit – Red Team PowerShell Script

March 12, 2020

RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam To Run: You can either run locally...

Read MoreRead more about RedRabbit – Red Team PowerShell Script
sifter_1_sifter
  • News

Sifter – A OSINT, Recon And Vulnerability Scanner

March 12, 2020

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order...

Read MoreRead more about Sifter – A OSINT, Recon And Vulnerability Scanner
future-infosec-automation-soar-insightconnect-rapid7
  • News

Why Our Future in InfoSec Depends on Automation

March 12, 2020

In a survey conducted by the Ponemon Institute and Domain Tools, 51% of respondents said they believe that automation will...

Read MoreRead more about Why Our Future in InfoSec Depends on Automation
Malware-200x125-1
  • News

Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan

March 11, 2020

By Jaromir Horejsi and Joseph C. Chen (Threat Researchers) We recently discovered a new campaign that we dubbed “Operation Overtrap”...

Read MoreRead more about Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan
Patch-Tuesday-200x125-1
  • News

March Patch Tuesday: LNK, Microsoft Word Vulnerabilities Get Fixes

March 11, 2020

Following the unexpectedly long list of fixes included in last month’s Patch Tuesday, March brings an even longer one, albeit...

Read MoreRead more about March Patch Tuesday: LNK, Microsoft Word Vulnerabilities Get Fixes
osint
  • News

Years-long malware operation hides njRAT in cracked hacking tools

March 11, 2020

Malicious actors have been secretly embedding the njRAT remote access trojan in free hacking tools as well as cracks of those...

Read MoreRead more about Years-long malware operation hides njRAT in cracked hacking tools
2_CF_
  • News

Rocket Loader skimmer impersonates CloudFlare library in clever scheme

March 11, 2020

Update: The digital certificate issued for httpsps has been revoked by GlobalSign. Fraudsters are known for using social engineering tricks...

Read MoreRead more about Rocket Loader skimmer impersonates CloudFlare library in clever scheme
security
  • News

Check Point: coronavirus has become a tool for hacker attacks on users and businesses

March 11, 2020

According to Check Point Threat Intelligence, more than 4,000 coronavirus-related domains have been registered worldwide since January 2020. 3% of...

Read MoreRead more about Check Point: coronavirus has become a tool for hacker attacks on users and businesses
56
  • News

Cisco Vulnerable Again; May Lead To Arbitrary Code Execution!

March 11, 2020

Earlier this year Cisco was in the headlines for the Zero-day vulnerabilities that were discovered in several of its devices...

Read MoreRead more about Cisco Vulnerable Again; May Lead To Arbitrary Code Execution!
cyber2Bcrime
  • News

The United States accused the manager of Group-IB of cybercrime

March 11, 2020

According to an indictment in a court database, US authorities accuse Nikita Kislitsin, manager of a Russian cybersecurity company Group-IB,...

Read MoreRead more about The United States accused the manager of Group-IB of cybercrime
network-2402637_960_720
  • News

Durham City, North Carolina Hit by Ransomware Attack

March 11, 2020

On Friday, The City of Durham, North Carolina suffered a cyberattack wherein Ryuk Ransomware crippled the city's IT systems and...

Read MoreRead more about Durham City, North Carolina Hit by Ransomware Attack
fuzzbench_1_FuzzBench-service
  • News

FuzzBench – Fuzzer Benchmarking As A Service

March 11, 2020

FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal...

Read MoreRead more about FuzzBench – Fuzzer Benchmarking As A Service
server-side-request-forgery-vulnerability-ssrf
  • News

SSRF Sheriff – A Simple SSRF-testing Sheriff Written In Go

March 11, 2020

This is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live...

Read MoreRead more about SSRF Sheriff – A Simple SSRF-testing Sheriff Written In Go
patches-2
  • News

Patch Tuesday – March 2020

March 11, 2020

Let's start off talking about CVE-2020-0688 from last month -- the Microsoft Exchange Validation Key RCE vulnerability. At the time...

Read MoreRead more about Patch Tuesday – March 2020
chicago-thotcon-conference-sybersecurity
  • News

Talking the Origins of THOTCON with Founder Nick Percoco

March 11, 2020

In a recent episode of Rapid7’s podcast, Security Nation, we talked with Nick Percoco, the creator of Chicago-based security conference...

Read MoreRead more about Talking the Origins of THOTCON with Founder Nick Percoco
Vulnerability-200x200-1
  • News

Busting Ghostcat: An Analysis of the Apache Tomcat Vulnerability (CVE-2020-1938 and CNVD-2020-10487)

March 10, 2020

by: Magno Logan (Information Security Specialist) Discussions surrounding the Ghostcat vulnerability (CVE-2020-1938 and CNVD-2020-10487) found in Apache Tomcat puts it...

Read MoreRead more about Busting Ghostcat: An Analysis of the Apache Tomcat Vulnerability (CVE-2020-1938 and CNVD-2020-10487)
osint
  • News

Durham, N.C. bull rushed by ransomware; recovery underway

March 10, 2020

The city of Durham, North Carolina and the government of Durham County have experienced disruptions since a ransomware attack last...

Read MoreRead more about Durham, N.C. bull rushed by ransomware; recovery underway
osint
  • News

Don’t get fooled again: Fake coronavirus emails impersonate the WHO to deliver FormBook trojan

March 10, 2020

Fears over the novel coronavirus have triggered mass quarantines, Purell and Clorox shortages and financial market turmoil. As global concerns...

Read MoreRead more about Don’t get fooled again: Fake coronavirus emails impersonate the WHO to deliver FormBook trojan
osint
  • News

A week in security (March 2 – 8)

March 10, 2020

Last week on Malwarebytes Labs, we fired up part 1 of our series on child identity theft, asked how well...

Read MoreRead more about A week in security (March 2 – 8)

Posts pagination

Previous 1 … 4,208 4,209 4,210 4,211 4,212 4,213 4,214 … 4,243 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: BAF Management Consulting

July 15, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: ProActive Solutions USA

July 15, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: The Paul Wilkinson Law Firm

July 15, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Greta Group

July 15, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Victoria Garden

July 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel