Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
pexels-anthony-133325
  • News

Cyberattacks Zero in Tokyo Olympics as Games Begin

July 29, 2021

 Malicious malware and websites have targeted both event organizers and regular spectators as the Tokyo Olympics' opening ceremony approaches. According to...

Read MoreRead more about Cyberattacks Zero in Tokyo Olympics as Games Begin
goran-ivos-iacpoKgpBAM-unsplash
  • News

Hackers Applying HTML Smuggling To Distribute Malware

July 29, 2021

 Another latest spam E-mail operation, which abused a technique named "HTML smuggling" to circumvent E-mail security measures and transmit malware...

Read MoreRead more about Hackers Applying HTML Smuggling To Distribute Malware
windows-11-6379123_1920
  • News

Fake Windows 11 Installers are Being Used to Spread Malware

July 29, 2021

 Although Windows 11 isn't expected to be released until later this year, hackers have already begun attempting to use it...

Read MoreRead more about Fake Windows 11 Installers are Being Used to Spread Malware
abstract-light-sl-scaled-1-990x400-1
  • News

DDoS attacks in Q2 2021

July 29, 2021

News overview In terms of big news, Q2 2021 was relatively calm, but not completely eventless. For example, April saw the...

Read MoreRead more about DDoS attacks in Q2 2021
CredPhish_1_credphish-752010
  • Tools

CredPhish – A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS

July 29, 2021

CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user...

Read MoreRead more about CredPhish – A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS
LoGiC.NET_2_after-702574
  • Tools

LoGiC.NET – A More Advanced Free And Open .NET Obfuscator Using Dnlib

July 29, 2021

LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works...

Read MoreRead more about LoGiC.NET – A More Advanced Free And Open .NET Obfuscator Using Dnlib
osint
  • News

IBM Cost of a Data Breach study: average Cost of Data Breach exceeds $4.2M

July 28, 2021

The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded...

Read MoreRead more about IBM Cost of a Data Breach study: average Cost of Data Breach exceeds $4.2M
osint
  • News

BlackMatter ransomware group claims to be Darkside and REvil succesor

July 28, 2021

BlackMatter ransomware gang, a new threat actor appears in the threat landscape and claims to combine TTPs of Darkside and...

Read MoreRead more about BlackMatter ransomware group claims to be Darkside and REvil succesor
osint
  • News

Flaws in Zimbra could allow to takeover webmail server of a targeted organization

July 28, 2021

Researchers discovered flaws in Zimbra email collaboration software that could allow attackers to compromise email accounts by sending a malicious...

Read MoreRead more about Flaws in Zimbra could allow to takeover webmail server of a targeted organization
osint
  • News

Kaseya Unitrends has unpatched vulnerabilities that could help attackers expand a breach

July 28, 2021

It must not be easy to work at Kaseya right now. While they are working as hard as they can...

Read MoreRead more about Kaseya Unitrends has unpatched vulnerabilities that could help attackers expand a breach
osint
  • News

The Clubhouse database “breach” is likely a non-breach. Here’s why.

July 28, 2021

Before the work week ended last week Friday, a security researcher found a leak of what is claimed to be...

Read MoreRead more about The Clubhouse database “breach” is likely a non-breach. Here’s why.
pexels-tima-miroshnichenko-5380641-4
  • News

Mobile County Officials Informs County Employees of Data Breach

July 28, 2021

 The officials of Mobile County in southwest Alabama, have finally notified county employees of a computer system breach that compromised...

Read MoreRead more about Mobile County Officials Informs County Employees of Data Breach
fly-d-zAhAUSdRLJ8-unsplash
  • News

Q2 2021 Report by Digital Shadow, Abridged

July 28, 2021

 Q2 2021 was among the most important ransomware periods, with several significant events taking place. Humans witnessed one of the...

Read MoreRead more about Q2 2021 Report by Digital Shadow, Abridged
pexels-anton-469242B252812529
  • News

WhatsApp CEO: US Allies’ National Security Officials Targeted with NSO Malware

July 28, 2021

 According to WhatsApp CEO Will Cathcart, governments used NSO group malware to target high-ranking government officials all around the world. Cathcart...

Read MoreRead more about WhatsApp CEO: US Allies’ National Security Officials Targeted with NSO Malware
man-talking-on-the-phone-1582238_1920
  • News

3.8 Billion Phone Numbers of Clubhouse Users up for Sale on Dark Web

July 28, 2021

 On a hacking forum, a threat actor has begun selling the confidential database of Clubhouse, which contains 3.8 billion phone...

Read MoreRead more about 3.8 Billion Phone Numbers of Clubhouse Users up for Sale on Dark Web
d3fend
  • Tools
  • Tutorials

Using MITRE D3FEND Framework (0.9.3-BETA-1)

July 28, 2021

The MITRE Corporation, one of the most respected organizations in the cybersecurity field, has released D3FEND, a complementary framework to...

Read MoreRead more about Using MITRE D3FEND Framework (0.9.3-BETA-1)
PRT
  • Tools

TokenTactics – Azure JWT Token Manipulation Toolset

July 28, 2021

Azure JSON Web Token ("JWT") Manipulation Toolset Azure access tokens allow you to authenticate to certain endpoints as a user...

Read MoreRead more about TokenTactics – Azure JWT Token Manipulation Toolset
reconmap_3-757233
  • Tools

Reconmap – VAPT (Vulnerability Assessment And Penetration Testing) Automation And Reporting Platform

July 28, 2021

Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security...

Read MoreRead more about Reconmap – VAPT (Vulnerability Assessment And Penetration Testing) Automation And Reporting Platform
osint
  • News

South Africa’s logistics company Transnet SOC hit by a ransomware attack

July 27, 2021

Transnet SOC Ltd, a large South African rail, port and pipeline company, announced it was hit by a disruptive cyber attack. South Africa’s logistics company...

Read MoreRead more about South Africa’s logistics company Transnet SOC hit by a ransomware attack
osint
  • News

DIVD discloses three new unpatched Kaseya Unitrends zero-days

July 27, 2021

Experts found three new zero-day flaws in the Kaseya Unitrends service and warn users to avoid exposing the service to...

Read MoreRead more about DIVD discloses three new unpatched Kaseya Unitrends zero-days
osint
  • News

Hackers flooded the Babuk ransomware gang’s forum with gay porn images

July 27, 2021

The Babuk ransomware operators seem to have suffered a ransomware attack, threat actors flooded their forum gay orgy porn images....

Read MoreRead more about Hackers flooded the Babuk ransomware gang’s forum with gay porn images
osint
  • News

Apple fixes CVE-2021-30807 flaw, the 13th zero-day this year

July 27, 2021

Apple released a security update that addresses CVE-2021-30807 flaw in macOS and iOS that may have been actively exploited to...

Read MoreRead more about Apple fixes CVE-2021-30807 flaw, the 13th zero-day this year
osint
  • News

No More Ransom helped ransomware victims to save almost €1B

July 27, 2021

The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for...

Read MoreRead more about No More Ransom helped ransomware victims to save almost €1B
CVE-prog
  • Vulnerabilities

CVE-2021-34301

July 27, 2021

Summary: A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The BMP_Loader.dll...

Read MoreRead more about CVE-2021-34301

Posts pagination

Previous 1 … 4,211 4,212 4,213 4,214 4,215 4,216 4,217 … 4,513 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[DRAGONFORCE] – Ransomware Victim: GB Mail

November 8, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Mold In Graphic Systems

November 8, 2025
image
  • Data Breach
  • Ransomware

[STORMOUS] – Ransomware Victim: !

November 8, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-12863 – Red Hat – Red Hat Enterprise Linux 10

November 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]153[.]205[.]30:8080

November 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel