Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials: A Practical Roadmap for Modern Infrastructures

August 11, 2025
unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
exchange_article_020
  • News

A Provider of Cyber Security Training Loses 28,000 Items of Personally Identifiable Information (PII) In a Data Breach

August 14, 2020

A provider of cybersecurity training and certification services, 'The Sans Institute', lost roughly 28,000 items of personally identifiable information (PII)...

Read MoreRead more about A Provider of Cyber Security Training Loses 28,000 Items of Personally Identifiable Information (PII) In a Data Breach
osint
  • News

Twitter Rolled-out its Latest Feature that Lets Users Limit Reply

August 14, 2020

In an attempt to make conversations more effective and meaningful, Twitter has rolled out a new feature that will allow...

Read MoreRead more about Twitter Rolled-out its Latest Feature that Lets Users Limit Reply
abstract-polygon-990x400-1
  • News

CactusPete APT group’s updated Bisonal backdoor

August 14, 2020

CactusPete (also known as Karma Panda or Tonto Team) is an APT group that has been publicly known since at...

Read MoreRead more about CactusPete APT group’s updated Bisonal backdoor
aws
  • News

AWS Report – A Tool For Analyzing Amazon Resources

August 14, 2020

AWS Report is a tool for analyzing amazon resources.Install using PIPpip install awsreportFeaturesSearch IAM users based on creation dateSearch buckets...

Read MoreRead more about AWS Report – A Tool For Analyzing Amazon Resources
Bastillion_2
  • News

Bastillion – A Web-Based SSH Console That Centrally Manages Administrative Access To Systems

August 14, 2020

Bastillion is a web-based SSH console that centrally manages administrative access to systems. Web-based administration is combined with management and...

Read MoreRead more about Bastillion – A Web-Based SSH Console That Centrally Manages Administrative Access To Systems
osint
  • News

Shadow Code in security’s blind spot, ups risk of attack

August 13, 2020

The proliferation of Shadow Code – third-party scripts and open source libraries used in web applications – may help organizations...

Read MoreRead more about Shadow Code in security’s blind spot, ups risk of attack
osint
  • News

Tesla RAT adapts, evolves to thwart security

August 13, 2020

It may be unsophisticated but the Agent Tesla RAT is “street-wise,” adapting and evolving just enough to wreak havoc on...

Read MoreRead more about Tesla RAT adapts, evolves to thwart security
link_example
  • News

Dutch ISP Ziggo demonstrates how not to inform your customers about a security flaw

August 13, 2020

“Can you have a look at this email I got, please?” my brother asked. “It looks convincing enough, but I...

Read MoreRead more about Dutch ISP Ziggo demonstrates how not to inform your customers about a security flaw
IMG_2245
  • News

About 84% of Russian companies have vulnerable IT system

August 13, 2020

More than 80% of companies in Russia neglect the basic means of protecting information systems and data, as a result...

Read MoreRead more about About 84% of Russian companies have vulnerable IT system
computer-1591018_960_720
  • News

A City In Colorado Attacked, Forced to Pay $45,000 Ransom

August 13, 2020

Lafayette city from Colorado had to pay a ransom amount worth $45,000 for decryption of files that were encrypted in...

Read MoreRead more about A City In Colorado Attacked, Forced to Pay $45,000 Ransom
nautilus_2_tree
  • News

Nautilus – A Grammar Based Feedback Fuzzer

August 13, 2020

Nautilus is a coverage guided, grammar based fuzzer. You can use it to improve your test coverage and find more...

Read MoreRead more about Nautilus – A Grammar Based Feedback Fuzzer
SharpChromium_1_cookies
  • News

SharpChromium – .NET 4.0 CLR Project To Retrieve Chromium Data, Such As Cookies, History And Saved Logins

August 13, 2020

SharpChromium is a .NET 4.0+ CLR project to retrieve data from Google Chrome, Microsoft Edge, and Microsoft Edge Beta. Currently,...

Read MoreRead more about SharpChromium – .NET 4.0 CLR Project To Retrieve Chromium Data, Such As Cookies, History And Saved Logins
patches-2
  • News

Patch Tuesday – August 2020

August 12, 2020

120 Vulnerabilities Patched in Microsoft's August 2020 Update Tuesday (2020-Aug Patch Tuesday)August 2020 brings along patches for 120 vulnerabilities within...

Read MoreRead more about Patch Tuesday – August 2020
osint
  • News

The skinny on the Instacart breach

August 12, 2020

The COVID-19 outbreak has affected many facets of our lives—from how we visit our families, socialize with friends, meet with...

Read MoreRead more about The skinny on the Instacart breach
IMG_2243
  • News

The Russian Federation leads in the number of users monitored via smartphones

August 12, 2020

In the first six months of 2020, the number of gadgets with Stalker software in Russia increased by 28% compared...

Read MoreRead more about The Russian Federation leads in the number of users monitored via smartphones
hacking-1
  • News

The United Nations Reports Increase in Internet Usage and Cyber Crime during the Pandemic

August 12, 2020

 The U.N. counterterrorism chief reported a 350% increase in phishing websites in just the first quarter of the year, mostly...

Read MoreRead more about The United Nations Reports Increase in Internet Usage and Cyber Crime during the Pandemic
IMG_2240
  • News

Security Experts gave tips on how to protect online conferences from hackers

August 12, 2020

Video conferencing services attracted the attention of hackers because they gained huge popularity during the coronavirus pandemic. On Thursday, attackers disrupted...

Read MoreRead more about Security Experts gave tips on how to protect online conferences from hackers
abstract-binary-990x400-1
  • News

Internet Explorer and Windows zero-day exploits used in Operation PowerFall

August 12, 2020

Executive summary In May 2020, Kaspersky technologies prevented an attack on a South Korean company by a malicious script for...

Read MoreRead more about Internet Explorer and Windows zero-day exploits used in Operation PowerFall
SkyArk_1_SkyArkLogo2
  • News

SkyArk – Helps To Discover, Assess And Secure The Most Privileged Entities In Azure And AWS

August 12, 2020

3. SkyArk includes more small sub-modules for playing around in the cloud security fieldAn example for such a sub-module is...

Read MoreRead more about SkyArk – Helps To Discover, Assess And Secure The Most Privileged Entities In Azure And AWS
pe_tree_1_pe_tree
  • News

PE Tree – Python Module For Viewing Portable Executable (PE) Files In A Tree-View

August 12, 2020

Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with...

Read MoreRead more about PE Tree – Python Module For Viewing Portable Executable (PE) Files In A Tree-View
wave-hero-bg
  • News

Rapid7 Named a Leader in the 2020 Forrester Wave™ for Midsize Managed Security Services Providers, Q3 2020

August 12, 2020

Rapid7 is thrilled to be named a Leader in The Forrester Wave™: Midsize Managed Security Services Providers, Q3 2020! The...

Read MoreRead more about Rapid7 Named a Leader in the 2020 Forrester Wave™ for Midsize Managed Security Services Providers, Q3 2020
spam0
  • News

SBA phishing scams: from malware to advanced social engineering

August 11, 2020

A number of threat actors continue to take advantage of the ongoing coronavirus pandemic through phishing scams and other campaigns...

Read MoreRead more about SBA phishing scams: from malware to advanced social engineering
osint
  • News

A week in security (August 3 – 9)

August 11, 2020

Last week on Malwarebytes Labs, on our Lock and Code podcast, we talked about identity and access management technology. We...

Read MoreRead more about A week in security (August 3 – 9)
osint
  • News

WhatsApp to Allow Users to Sync Chat Between iOS and Android

August 11, 2020

When switching devices from Android to iOS or the other way round, users were not able to retain the chat...

Read MoreRead more about WhatsApp to Allow Users to Sync Chat Between iOS and Android

Posts pagination

Previous 1 … 4,261 4,262 4,263 4,264 4,265 4,266 4,267 … 4,340 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-54195

August 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54197

August 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54206

August 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54207

August 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54208

August 13, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel