Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security for a Safer Digital Life

July 16, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
ball-63527_960_720
  • News

12,000+ Jenkins servers can be used to launch DDoS attacks

February 13, 2020

According to Radware researchers, a vulnerability (CVE-2020-2100) in 12,000+ Jenkins servers can be exploited to launch and amplify DDoS attacks...

Read MoreRead more about 12,000+ Jenkins servers can be used to launch DDoS attacks
hashcracker_1_usage2
  • News

Hashcracker – Python Hash Cracker

February 13, 2020

Supported hashing algorithms: SHA512, SHA256, SHA384, SHA1, MD5 Features: auto detection of hashing algorithm based on length (not recommended), bruteforce,...

Read MoreRead more about Hashcracker – Python Hash Cracker
KawaiiDeauther_5
  • News

KawaiiDeauther – Jam All Wifi Clients/Routers

February 13, 2020

Kawaii Deauther is a pentest toolkit whose goal is to perform jam on WiFi clients/routers and spam many fake AP...

Read MoreRead more about KawaiiDeauther – Jam All Wifi Clients/Routers
cloud-security-misconfigurations
  • News

How to Handle Misconfigurations in the Cloud

February 13, 2020

This blog post is part three of our four-part series on security in the cloud. In part one, we discussed...

Read MoreRead more about How to Handle Misconfigurations in the Cloud
Patch-Tuesday-200x125-1
  • News

February Patch Tuesday: Fixes for Critical LNK, RDP, Trident Vulnerabilities

February 12, 2020

The first Patch Tuesday of 2020 in January brought an unusually long list of patches, but February brings an even...

Read MoreRead more about February Patch Tuesday: Fixes for Critical LNK, RDP, Trident Vulnerabilities
osint
  • News

Phishing emails lure victims with news of coronavirus’ impact on shipping

February 12, 2020

Looking to capitalize on the current coronavirus scare, malware distributors have launched a new phishing campaign that targets global companies...

Read MoreRead more about Phishing emails lure victims with news of coronavirus’ impact on shipping
social2Bmedia
  • News

Deputy of the State Duma of the Russian Federation: it is necessary at the legislative level to protect the data of Russians on Facebook

February 12, 2020

Andrey Alshevskikh, the State Duma Deputy, said that the threat to the personal data of Russian users of the social...

Read MoreRead more about Deputy of the State Duma of the Russian Federation: it is necessary at the legislative level to protect the data of Russians on Facebook
computer-1294359_960_720
  • News

Glitch in Tax Service Exposed 1.2 Million Danes’ CPR Numbers

February 12, 2020

A bug in the TastSelv Borger tax service which falls under the management of the US company DXC Technology has...

Read MoreRead more about Glitch in Tax Service Exposed 1.2 Million Danes’ CPR Numbers
shutterstock_1634011555-710x458-1
  • News

Scammers Target Coindesk ;Impersonating Reporters and Editors in the Last Months

February 12, 2020

Scammers have a new target and this time its CoinDesk as they try to impersonate CoinDesk reporters and editors in...

Read MoreRead more about Scammers Target Coindesk ;Impersonating Reporters and Editors in the Last Months
22
  • News

Cisco’s Routers. Switches and IP Equipment Suffer Zero-Day Attacks! Major Vulnerabilities Discovered!

February 12, 2020

The extremely well-known Cisco’s products, including IP Phones, Routers, cameras, and switches, were determined to have several severe “zero-day” vulnerabilities...

Read MoreRead more about Cisco’s Routers. Switches and IP Equipment Suffer Zero-Day Attacks! Major Vulnerabilities Discovered!
agente_1_agente
  • News

Agente – Distributed Simple And Robust Release Management And Monitoring System

February 12, 2020

Distributed simple and robust release management and monitoring system.**This project on going work.Road mapCore systemFirst worker agentManagement dashboardJenkins vs CI...

Read MoreRead more about Agente – Distributed Simple And Robust Release Management And Monitoring System
XSS-Freak_1_proof
  • News

XSS-Freak – An XSS Scanner Fully Written In Python3 From Scratch

February 12, 2020

XSS-Freak is an XSS scanner fully written in python3 from scratch. It is one of its kind since it crawls...

Read MoreRead more about XSS-Freak – An XSS Scanner Fully Written In Python3 From Scratch
patches-2
  • News

Patch Tuesday – February 2020

February 12, 2020

A relatively modest 99-vulnerability February Patch Tuesday has arrived with a fix for the Internet Explorer 0-day CVE-2020-0674 (originally ADV200001)...

Read MoreRead more about Patch Tuesday – February 2020
security-operations-center-soc-visibility-traid-rapid7-r7
  • News

Intro to the SOC Visibility Triad

February 12, 2020

Data aggregated from these three core security realms can give the SOC an overall view of the most critical activity...

Read MoreRead more about Intro to the SOC Visibility Triad
osint
  • News

Malwarebytes Labs releases 2020 State of Malware Report

February 11, 2020

Malwarebytes Labs today released the results of our annual study on the state of malware—the 2020 State of Malware Report—and...

Read MoreRead more about Malwarebytes Labs releases 2020 State of Malware Report
WHO-safe-to-receive-package-from-China-600x300-1
  • News

Battling online coronavirus scams with facts

February 11, 2020

Panic and confusion about the recent coronavirus outbreak spurred threat actors to launch several malware campaigns across the world, relying...

Read MoreRead more about Battling online coronavirus scams with facts
osint
  • News

A week in security (February 3 – 9)

February 11, 2020

Last week on Malwarebytes Labs, we looked at Washington state’s latest efforts in providing better data privacy rights for their...

Read MoreRead more about A week in security (February 3 – 9)
smart-home
  • News

Computers can be hacked through a “smart” light bulb

February 11, 2020

Smart light bulbs can not only make the lighting in an apartment and house more convenient and cheaper but also...

Read MoreRead more about Computers can be hacked through a “smart” light bulb
social-3064515_1280
  • News

CEO of a detective agency and speaker on cyber attacks: users should understand that Facebook is leaking their data

February 11, 2020

Numerous Facebook leaks in 2013 and 2016 put users in a position where they are not responsible for their security....

Read MoreRead more about CEO of a detective agency and speaker on cyber attacks: users should understand that Facebook is leaking their data
abstract-network-990x400-1
  • News

KBOT: sometimes they come back

February 11, 2020

Although by force of habit many still refer to any malware as a virus, this once extremely common class of...

Read MoreRead more about KBOT: sometimes they come back
ipv6tools_1_scanning
  • News

IPv6Tools – A Robust Modular Framework That Enables The Ability To Visually Audit An IPv6 Enabled Network

February 11, 2020

The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv6 enabled...

Read MoreRead more about IPv6Tools – A Robust Modular Framework That Enables The Ability To Visually Audit An IPv6 Enabled Network
pytm_2_seq
  • News

Pytm – A Pythonic Framework For Threat Modeling

February 11, 2020

Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm...

Read MoreRead more about Pytm – A Pythonic Framework For Threat Modeling
Targeted-attacks-200x200-1
  • News

Outlaw Updates Kit to Kill Older Miner Versions, Targets More Systems

February 10, 2020

By Jindrich Karasek (Threat Researcher) As we’ve observed with cybercriminal groups that aim to maximize profits for every campaign, silence...

Read MoreRead more about Outlaw Updates Kit to Kill Older Miner Versions, Targets More Systems
data-4404730_1280
  • News

Data from more than half a million clients of Russian microfinance organizations has been put up for sale

February 10, 2020

The base of more than 1.2 million MFIs clients, which is in the top 10 on the market, is up...

Read MoreRead more about Data from more than half a million clients of Russian microfinance organizations has been put up for sale

Posts pagination

Previous 1 … 4,219 4,220 4,221 4,222 4,223 4,224 4,225 … 4,246 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: ResourceEnergy

July 16, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Specialty Components

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50100

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50108

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50101

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel