Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025
unlock_membership
  • Premium Members Content

Mastering IoT Security Strategies for a Safer Connected World

August 6, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Forensic Analysis in Cybersecurity

August 4, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security in a Digital World

August 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
How-Rapid7-Customers-Are-Using-Network-Traffic-Analysis-in-Detection-and-Response-2
  • News

How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response

June 19, 2020

In case you missed it, we introduced Network Traffic Analysis for our InsightIDR and MDR customers a few months back....

Read MoreRead more about How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response
osint
  • News

Cyber snoops targeted aerospace, defense employees with fake job offers on LinkedIn

June 18, 2020

A cyber espionage operation used fake job offers, sent via LinkedIn messages, to target employees at aerospace and military companies...

Read MoreRead more about Cyber snoops targeted aerospace, defense employees with fake job offers on LinkedIn
resume
  • News

Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature

June 18, 2020

This blog post was authored by Hossein Jazi and Jérôme Segura On June 10, we found a malicious Word document...

Read MoreRead more about Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature
osint
  • News

End of line: supporting IoT in the home

June 18, 2020

Trouble is potentially brewing in Internet of Things (IoT) land, even if the consequences may still be a little way...

Read MoreRead more about End of line: supporting IoT in the home
IMG_1363
  • News

The Russian quality system (Roskachestvo) spoke about the vulnerabilities of “smart” homes

June 18, 2020

According to Roskachestvo, the Internet of things devices can violate the physical and information security of the owner if hackers...

Read MoreRead more about The Russian quality system (Roskachestvo) spoke about the vulnerabilities of “smart” homes
osint
  • News

All You Need to Know About the Recent DDoS Attacks and Threats that have Surfaced in the U.S

June 18, 2020

Cybersecurity experts have denied incidents of any DDoS s attacks in recent times. However, the attacks on T-Mobile's services that...

Read MoreRead more about All You Need to Know About the Recent DDoS Attacks and Threats that have Surfaced in the U.S
IMG_1360
  • News

Devicelock: data from 115 thousand Russians was put up for sale on the Web

June 18, 2020

A database with the data of Russians stuck abroad because of the coronavirus and returning to their homeland was put...

Read MoreRead more about Devicelock: data from 115 thousand Russians was put up for sale on the Web
osint
  • News

Know ways to avoid credit or debit card frauds

June 18, 2020

Since 2016, when India decided to go cashless the growth of online payments increased exponentially but not without risks. Online...

Read MoreRead more about Know ways to avoid credit or debit card frauds
blockchain-3750157_1280
  • News

Apple’s APSDaemon Vulnerability Abused by Malware Distributors

June 18, 2020

Attackers can maliciously redirect users on websites sharing counterfeit products, adult content or videos and dupe them into installing malware...

Read MoreRead more about Apple’s APSDaemon Vulnerability Abused by Malware Distributors
securelist_wasd_game-990x400-1
  • News

Do cybercriminals play cyber games during quarantine?

June 18, 2020

Thanks to the coronavirus pandemic, the role of the Internet in our lives has undergone changes, including irreversible ones. Some...

Read MoreRead more about Do cybercriminals play cyber games during quarantine?
TeaBreak_1_Tea252520Break
  • News

TeaBreak – A Productivity Burp Extension Which Reminds To Take Break While You Are At Work!

June 18, 2020

TeaBreak is a simple burp extension for security researchers and bug bounty hunters for helping them to increase their work...

Read MoreRead more about TeaBreak – A Productivity Burp Extension Which Reminds To Take Break While You Are At Work!
Digital-Signature-Hijack_1
  • News

Digital Signature Hijack – Binaries, PowerShell Scripts And Information About Digital Signature Hijacking

June 18, 2020

Hijacking legitimate digital signatures is a technique that can be used during red team assessments in order to sign PowerShell...

Read MoreRead more about Digital Signature Hijack – Binaries, PowerShell Scripts And Information About Digital Signature Hijacking
The-Security-Practitioner-s-Intro-to-the-Cloud-Everything-You-Ever-Wanted-to-Know-But-Were-Afraid-to-Ask
  • News

The Security Practitioner’s Intro to the Cloud: Everything You Ever Wanted to Know But Were Afraid to Ask

June 18, 2020

Before I bought a house a few years ago, my understanding of mortgages was pretty shaky at best. I only...

Read MoreRead more about The Security Practitioner’s Intro to the Cloud: Everything You Ever Wanted to Know But Were Afraid to Ask
IMG_1351
  • News

In Armenia data about thousands of patients with coronavirus were leaked

June 17, 2020

The National Security Service of Armenia (NSS) finds out that the personal data of 3,500 patients with coronavirus and their...

Read MoreRead more about In Armenia data about thousands of patients with coronavirus were leaked
SecretFinder_1
  • News

SecretFinder – A Python Script For Find Sensitive Data (Apikeys, Accesstoken, JWT…) And Search Anything On Javascript Files

June 17, 2020

SecretFinder is a python script based on LinkFinder, written to discover sensitive data like apikeys, accesstoken, authorizations, jwt,..etc in JavaScript...

Read MoreRead more about SecretFinder – A Python Script For Find Sensitive Data (Apikeys, Accesstoken, JWT…) And Search Anything On Javascript Files
post-img-62859
  • News

SIEM Security Tools: Six Expensive Misconceptions

June 17, 2020

How next-gen SIEM security solutions increase time to value in a modern threat environmentThe changing security landscape demands the most...

Read MoreRead more about SIEM Security Tools: Six Expensive Misconceptions
Unlocking-the-Power-of-Macro-Authentication-Part-One2
  • News

Unlocking the Power of Macro Authentication: Part One

June 17, 2020

This blog post is part one in a three-part series on macro authentication.You may have come across macro authentication when...

Read MoreRead more about Unlocking the Power of Macro Authentication: Part One
osint
  • News

VPNs: should you use them?

June 16, 2020

We are going to talk today about something you’ve likely heard of before: VPNs, or Virtual Private Networks. We at...

Read MoreRead more about VPNs: should you use them?
fsociety_9_cli
  • News

Fsociety – A Modular Penetration Testing Framework

June 16, 2020

Become a Patron! Installpip install fsocietyUpdatepip install --upgrade fsocietyUsageusage: fsociety A Penetration Testing Frameworkoptional arguments: -h, --help show this help...

Read MoreRead more about Fsociety – A Modular Penetration Testing Framework
shutterstock_2298163062B252812529
  • News

Threats to U.S. Space Systems Multiply Rapidly; a Novel Approach Emerges For Protection

June 16, 2020

Become a Patron! The increasing vulnerability of U.S. space systems lately has incited its rivals to begin with their development...

Read MoreRead more about Threats to U.S. Space Systems Multiply Rapidly; a Novel Approach Emerges For Protection
osint
  • News

Targeting U.S. banks, Qbot trojan evolves with new evasion techniques

June 16, 2020

By malware standards, the banking trojan Qbot is long in the tooth, but it still has some bite, according to...

Read MoreRead more about Targeting U.S. banks, Qbot trojan evolves with new evasion techniques
osint
  • News

A week in security (June 8 – 14)

June 16, 2020

Last week on Malwarebytes Labs, we looked into nasty search hijackers that worried a lot of Chrome users; a list...

Read MoreRead more about A week in security (June 8 – 14)
osint
  • News

Enel Group attacked by SNAKE ransomware same as Honda

June 16, 2020

The Enel Group, a power, and sustainability company were hit by EKANS (SNAKE) ransomware on June 7th affecting its internal...

Read MoreRead more about Enel Group attacked by SNAKE ransomware same as Honda
programming-code-abstract-990x400-1
  • News

Explicit content and cyberthreats: 2019 report

June 16, 2020

‘Stay at home’ is the new motto for 2020 and it has entailed many changes to our daily lives, most...

Read MoreRead more about Explicit content and cyberthreats: 2019 report

Posts pagination

Previous 1 … 4,259 4,260 4,261 4,262 4,263 4,264 4,265 … 4,323 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]200[.]193[.]211:8090

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]113[.]217[.]92:8001

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]40[.]112[.]176:8087

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]143[.]114[.]43:8090

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]43[.]94[.]35:9180

August 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel