Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials: A Practical Roadmap for Modern Infrastructures

August 11, 2025
unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Hackers Use Bugs To Attack iOS and Android Devices; Google Doesn’t Disclose Details

November 13, 2020

 Google's cybersecurity team found a cluster of high-end vulnerabilities in iOS, Windows, Android, and Chrome earlier this week. According to...

Read MoreRead more about Hackers Use Bugs To Attack iOS and Android Devices; Google Doesn’t Disclose Details
securelist_spam_2-990x400-1
  • News

Spam and phishing in Q3 2020

November 13, 2020

Quarterly highlights Worming their way in: cybercriminal tricks of the trade These days, many companies distribute marketing newsletters via online...

Read MoreRead more about Spam and phishing in Q3 2020
osint
  • Vulnerabilities

Scope of Debian’s /home/loser is with permissions 755, default umask 002

November 13, 2020

Posted by Georgi Guninski on Nov 12On Debian /home/loser is with permissions 755, default umask 0022 (If you don't understand...

Read MoreRead more about Scope of Debian’s /home/loser is with permissions 755, default umask 002
osint
  • Vulnerabilities

Avian JVM FileOutputStream.write() Integer Overflow

November 13, 2020

Posted by Pietro Oliva via Fulldisclosure on Nov 12Vulnerability title: Avian JVM FileOutputStream.write() Integer Overflow Author: Pietro Oliva Vendor: ReadyTalk...

Read MoreRead more about Avian JVM FileOutputStream.write() Integer Overflow
FAMA_2
  • News

FAMA – Forensic Analysis For Mobile Apps

November 13, 2020

LabCIF - Forensic Analysis for Mobile AppsGetting StartedAndroid extraction and analysis framework with an integrated Autopsy Module. Dump easily user...

Read MoreRead more about FAMA – Forensic Analysis For Mobile Apps
leonidas_1_architecture
  • News

Leonidas – Automated Attack Simulation In The Cloud, Complete With Detection Use Cases

November 13, 2020

Leonidas is a framework for executing attacker actions in the cloud. It provides a YAML-based format for defining cloud attacker...

Read MoreRead more about Leonidas – Automated Attack Simulation In The Cloud, Complete With Detection Use Cases
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Animal Jam – 7,104,998 breached accounts

November 12, 2020

In October 2020, the online game for kids Animal Jam suffered a data breach which was subsequently shared through online...

Read MoreRead more about Animal Jam – 7,104,998 breached accounts
RegretLocker-quarantined
  • News

RegretLocker, new ransomware, can encrypt Windows virtual hard disks

November 12, 2020

Cybersecurity researchers discovered a new ransomware last month called RegretLocker that, despite a no-frills package, can do serious damage to...

Read MoreRead more about RegretLocker, new ransomware, can encrypt Windows virtual hard disks
wallet-3950973_960_720
  • News

Walleon Smart Wallet – where Elegance, Fashion, and Innovation meet

November 12, 2020

With everything evolving around us, technology has reached another great peak when smart wallets came to the market. Being sure,...

Read MoreRead more about Walleon Smart Wallet – where Elegance, Fashion, and Innovation meet
dd00f3d904c02459abc4e6fc2b7984cfcfc4749b
  • News

Czech Republic’s Intelligence Agency Reveal on Russian And Chinese Spies Posing an Imminent Threat to The EU Member’s Security

November 12, 2020

 The Czech Republic's intelligence agency recently revealed that Russian and Chinese spies posed an up and coming threat to the...

Read MoreRead more about Czech Republic’s Intelligence Agency Reveal on Russian And Chinese Spies Posing an Imminent Threat to The EU Member’s Security
startup-3267505_1280
  • News

Interview with Shanmugavel Sankaran, founder of FixNix – The Entrepreneur who sold his house

November 12, 2020

Shanmugavel Sankaran has previously worked with Microsoft and IBM in a variety of information security and compliance management positions. Now...

Read MoreRead more about Interview with Shanmugavel Sankaran, founder of FixNix – The Entrepreneur who sold his house
abstract-blue-digital-man-990x400-1
  • News

Targeted ransomware: it’s not just about encrypting your data!

November 12, 2020

When we talk about ransomware, we need to draw a line between what it used to be and what it...

Read MoreRead more about Targeted ransomware: it’s not just about encrypting your data!
OctopusWAF_1_octopuswaf2
  • News

Octopus WAF – Web Application Firewall Made In C Language And Use Libevent

November 12, 2020

OctopusWAF is a open source Web application firewall, is made in C language uses libevent to make multiple connections. First...

Read MoreRead more about Octopus WAF – Web Application Firewall Made In C Language And Use Libevent
nfc
  • News

NFCGate – An NFC Research Toolkit Application For Android

November 12, 2020

NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching...

Read MoreRead more about NFCGate – An NFC Research Toolkit Application For Android
2021-Detection-and-Response-Planning-Part-4-Planning-for-Success-with-a-Cloud-SIEM2
  • News

2021 Detection and Response Planning, Part 4: Planning for Success with a Cloud SIEM

November 12, 2020

This is the fourth and final installment of our series around 2021 security planning. Through this series, we talked to...

Read MoreRead more about 2021 Detection and Response Planning, Part 4: Planning for Success with a Cloud SIEM
patches-2
  • News

Patch Tuesday – November 2020

November 11, 2020

Jumping right back to a triple digit volume of vulnerabilities resolved, Microsoft covers 112 CVEs this November affecting products ranging...

Read MoreRead more about Patch Tuesday – November 2020
fantasy-door-surreal
  • News

VMware ESXi OpenSLP Remote Code Execution Vulnerability (CVE-2020-3992 and CVE-2019-5544): What You Need To Know

November 11, 2020

What’s up? On November 6, 2020 Microsoft’s Kevin Beaumont alerted the community to evidence of active exploitation attempts of CVE-2020-3992...

Read MoreRead more about VMware ESXi OpenSLP Remote Code Execution Vulnerability (CVE-2020-3992 and CVE-2019-5544): What You Need To Know
updating-600x341-1
  • News

Mozilla patches critical security issues in Firefox and Thunderbird

November 11, 2020

Mozilla has issued a critical patch for Firefox, Firefox ESR, and Thunderbird after a security issue was discovered at the...

Read MoreRead more about Mozilla patches critical security issues in Firefox and Thunderbird
py3webfuzz_3_sqli-code-test
  • News

Py3Webfuzz – A Python3 Module To Assist In Fuzzing Web Applications

November 11, 2020

Based on pywebfuzz, Py3webfuzz is a Python3 module to assist in the identification of vulnerabilities in web applications, Web Services...

Read MoreRead more about Py3Webfuzz – A Python3 Module To Assist In Fuzzing Web Applications
paradoxiaRAT_1_logo
  • News

paradoxiaRAT – Native Windows Remote Access Tool

November 11, 2020

Paradoxia Remote Access Tool. FeaturesParadoxia Console Feature Description Easy to use Paradoxia is extremely easy to use, So far the easiest...

Read MoreRead more about paradoxiaRAT – Native Windows Remote Access Tool
osint
  • Vulnerabilities

[No cON Name] #ncn2k20 CFP online – Barcelona

November 11, 2020

Posted by José Nicolás Castellano on Nov 10No cON Name 2020 - Online Edition Call For Papers https://www.noconname.org/call-for-papers/     *...

Read MoreRead more about [No cON Name] #ncn2k20 CFP online – Barcelona
osint
  • Vulnerabilities

NtFileSins v2.2 / Windows NTFS Privileged File Access Enumeration Tool (Python v3)

November 11, 2020

Posted by hyp3rlinx on Nov 10from subprocess import Popen, PIPE import sys,argparse,re #MIT License #Copyright (c) 2020 John Page (aka...

Read MoreRead more about NtFileSins v2.2 / Windows NTFS Privileged File Access Enumeration Tool (Python v3)
SaltStack
  • News

SaltStack Pre-Authenticated Remote Root (CVE-2020-16846 and CVE-2020-25592): What You Need to Know

November 11, 2020

What’s up? We start the November critical vulnerability season with a pair of CVEs—CVE-2020-16846 and CVE-2020-25592—that, when combined, can result...

Read MoreRead more about SaltStack Pre-Authenticated Remote Root (CVE-2020-16846 and CVE-2020-25592): What You Need to Know
Visualizing-Network-Traffic-Data-to-Drive-Action2
  • News

Visualizing Network Traffic Data to Drive Action

November 11, 2020

Top 5 multi group queries for analyzing network sensor dataWe launched the Insight Network Sensor earlier this year and have...

Read MoreRead more about Visualizing Network Traffic Data to Drive Action

Posts pagination

Previous 1 … 4,236 4,237 4,238 4,239 4,240 4,241 4,242 … 4,344 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-52585

August 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-50251

August 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-51691

August 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54809

August 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53859

August 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel