Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025
unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
coronavirus-4818064_960_720
  • News

China Alleges India for Cyber-attacks Amid the Coronavirus Outbreak. Demands International Cooperation.

February 9, 2020

China, who is currently battling against the deadly coronavirus epidemic said last Friday that it needs international support from countries...

Read MoreRead more about China Alleges India for Cyber-attacks Amid the Coronavirus Outbreak. Demands International Cooperation.
66
  • News

Apple Deliberately Restricts Old Versioned iPhones’ Performance; Gets Fined!

February 9, 2020

Apple, the technology giant famously known for its partially eaten logo among other things, was recently fined by France’s authority...

Read MoreRead more about Apple Deliberately Restricts Old Versioned iPhones’ Performance; Gets Fined!
WKTlr2ffvL6CAISm7oSzSZCLe
  • News

FockCache – Minimalized Test Cache Poisoning

February 9, 2020

FockCache - Minimalized Test Cache PoisoningDetail For Cache Poisoning : https://portswigger.net/research/practical-web-cache-poisoningFockCacheFockCache tries to make cache poisoning by trying X-Forwarded-Host and...

Read MoreRead more about FockCache – Minimalized Test Cache Poisoning
v13_scans_wide
  • News

Acunetix v13 – Web Application Security Scanner

February 9, 2020

Acunetix, the pioneer in automated web application security software, has announced the release of Acunetix Version 13. The new release...

Read MoreRead more about Acunetix v13 – Web Application Security Scanner
osint
  • News

Metamofo banking malware spreads around the world

February 8, 2020

A new variant of the Metamorfo banking malware is on the loose targeting a wider range of financial institutions than...

Read MoreRead more about Metamofo banking malware spreads around the world
osint
  • News

Google Maps: online interventions with offline ramifications

February 8, 2020

The places where online life directly intersection with that lived offline will be forever fascinating, illustrated perfectly through a recent...

Read MoreRead more about Google Maps: online interventions with offline ramifications
maxresdefault
  • News

Clause Addition to the IT Act; Social Media Companies Now Responsible For All Nonuser Generated Content

February 8, 2020

What expedited the change was an issue that occurred in the previous year a disagreement regarding content between social media...

Read MoreRead more about Clause Addition to the IT Act; Social Media Companies Now Responsible For All Nonuser Generated Content
pexels-photo-259200
  • News

Banking Trojan ‘Metamorfo’ Now Targeting Online Users’ Banking Services

February 8, 2020

Online banking users are being targeted by a trojan malware campaign going around the globe with the agenda of gaining...

Read MoreRead more about Banking Trojan ‘Metamorfo’ Now Targeting Online Users’ Banking Services
abstractpicture9990897-990x400-1
  • News

Happy New Fear! Gift-wrapped spam and phishing

February 8, 2020

Pre-holiday spam Easy money In the run-up to Christmas and New Year, scam е-mails mentioning easy pickings, lottery winnings, and...

Read MoreRead more about Happy New Fear! Gift-wrapped spam and phishing
SEcraper_1_secraper-showcase
  • News

SEcraper – Search Engine Scraper Tool With BASH Script.

February 8, 2020

Search engine scraper tool with BASH script.Dependencycurl (cli)Available search engineAsk.comSearch.yahoo.comBing.comInstallationgit clone https://github.com/zerobyte-id/SEcraper.gitcd SEcraper/Runbash secraper.bash "QUERY"Download SEcraper Original Source

Read MoreRead more about SEcraper – Search Engine Scraper Tool With BASH Script.
Re2Pcap_3_re2pcap
  • News

Re2Pcap – Create PCAP file from raw HTTP request or response in seconds

February 8, 2020

Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using Re2Pcap and test them against...

Read MoreRead more about Re2Pcap – Create PCAP file from raw HTTP request or response in seconds
Vuln
  • News

Rapid7 Analysis and Guidance: CDPwn (CVE-2020-3118)

February 8, 2020

Note: There are five different CVEs associated with the CDPwn vulnerability group. Each of them targets a different class of...

Read MoreRead more about Rapid7 Analysis and Guidance: CDPwn (CVE-2020-3118)
alsoadmin-600x75-1
  • News

Adposhel adware takes over browser push notifications administration

February 7, 2020

Since late last year, our researchers have been monitoring new methods being deployed by cybercriminals to potentially abuse browser push...

Read MoreRead more about Adposhel adware takes over browser push notifications administration
refuel
  • News

Group of 10 hackers was convicted for stealing gasoline and selling

February 7, 2020

The court issued a verdict on February 3 in the case of theft of fuel at Rosneft gas stations.The court...

Read MoreRead more about Group of 10 hackers was convicted for stealing gasoline and selling
123
  • News

120 Million Medical Records Leaked! Global Medical Report Sheds More Light.

February 7, 2020

Along with cyber-security within your phones and other devices, you must make sure the hospital you go to has enough...

Read MoreRead more about 120 Million Medical Records Leaked! Global Medical Report Sheds More Light.
takeover_1
  • News

Takeover v0.2 – Sub-Domain TakeOver Vulnerability Scanner

February 7, 2020

Sub-domain takeover vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed...

Read MoreRead more about Takeover v0.2 – Sub-Domain TakeOver Vulnerability Scanner
misp-dashboard_1_dashboard-live
  • News

Misp-Dashboard – A Dashboard For A Real-Time Overview Of Threat Intelligence From MISP Instances

February 7, 2020

A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can...

Read MoreRead more about Misp-Dashboard – A Dashboard For A Real-Time Overview Of Threat Intelligence From MISP Instances
three-3-questions-infosec-security-program-rapid7
  • News

3 Questions to Ask Yourself When Justifying Your Infosec Program

February 7, 2020

On the Rapid7 Labs team, we’re constantly looking for ways to give defenders a boost in the work they need...

Read MoreRead more about 3 Questions to Ask Yourself When Justifying Your Infosec Program
Mobile-200x125-1
  • News

Malicious Optimizer and Utility Android Apps on Google Play Communicate with Trojans that Install Malware, Perform Mobile Ad Fraud

February 6, 2020

By Lorin Wu (Mobile Threats Analyst) We recently discovered several malicious optimizer, booster, and utility apps (detected by Trend Micro...

Read MoreRead more about Malicious Optimizer and Utility Android Apps on Google Play Communicate with Trojans that Install Malware, Perform Mobile Ad Fraud
osint
  • News

Cybercriminals abuse Bitbucket to infect users with potpourri of malware

February 6, 2020

A newly discovered attack campaign has been abusing the online storage platform Bitbucket to maintain and update a wide assortment...

Read MoreRead more about Cybercriminals abuse Bitbucket to infect users with potpourri of malware
shutterstock_401964952-600x400-1
  • News

Fintech security: the challenges and fails of a new era

February 6, 2020

“I have no idea how this app from my bank works, and I don’t trust what I don’t understand.” Josh...

Read MoreRead more about Fintech security: the challenges and fails of a new era
computer-1895383_960_720
  • News

Teenager Arrested for DDoS Attack in Ukraine

February 6, 2020

Ukranian Police arrested a 16 yrs old teenager last month on charges of attacking a local Internet Service Provider (ISP)...

Read MoreRead more about Teenager Arrested for DDoS Attack in Ukraine
osint
  • News

Apple Engineers unveils a proposal to standardize the two factor authentication process and Google backs it up!

February 6, 2020

Apple known for it's off the charts security features was recently troubled with hacks, malware and phishing attacks staining its...

Read MoreRead more about Apple Engineers unveils a proposal to standardize the two factor authentication process and Google backs it up!
jaeles_5_jaeles-architecture
  • News

Jaeles v0.4 – The Swiss Army Knife For Automated Web Application Testing

February 6, 2020

Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.InstallationDownload precompiled...

Read MoreRead more about Jaeles v0.4 – The Swiss Army Knife For Automated Web Application Testing

Posts pagination

Previous 1 … 4,213 4,214 4,215 4,216 4,217 4,218 4,219 … 4,239 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-7540

July 14, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7536

July 14, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53865

July 14, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7538

July 14, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7537

July 14, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel