Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials: A Practical Roadmap for Modern Infrastructures

August 11, 2025
unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 36[.]213[.]31[.]77:10443

March 20, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 36[.]213[.]31[.]77:10443
offensive_security
  • Offensive Security
  • Premium Members Content

Bypassing Antivirus with Metasploit Templates: A quick dip into AV Evasion

March 20, 2025

Introduction In the realm of cybersecurity, attackers continually develop methods to circumvent antivirus (AV) protections. One such method involves leveraging...

Read MoreRead more about Bypassing Antivirus with Metasploit Templates: A quick dip into AV Evasion
image
  • Vulnerabilities

CVE Alert: CVE-2025-29783

March 20, 2025

Vulnerability Summary: CVE-2025-29783 vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. When vLLM is configured to...

Read MoreRead more about CVE Alert: CVE-2025-29783
image
  • Vulnerabilities

CVE Alert: CVE-2025-26475

March 20, 2025

Vulnerability Summary: CVE-2025-26475 Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.26, Enables Live-Restore setting which enhances security...

Read MoreRead more about CVE Alert: CVE-2025-26475
image
  • Vulnerabilities

CVE Alert: CVE-2025-2324

March 20, 2025

Vulnerability Summary: CVE-2025-2324 Improper Privilege Management vulnerability for users configured as Shared Accounts in Progress MOVEit Transfer (SFTP module) allows...

Read MoreRead more about CVE Alert: CVE-2025-2324
image
  • Vulnerabilities

CVE Alert: CVE-2025-30154

March 20, 2025

Vulnerability Summary: CVE-2025-30154 reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and...

Read MoreRead more about CVE Alert: CVE-2025-30154
image
  • Vulnerabilities

CVE Alert: CVE-2025-30196

March 20, 2025

Vulnerability Summary: CVE-2025-30196 Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for links it creates based on workspace content,...

Read MoreRead more about CVE Alert: CVE-2025-30196
image
  • Vulnerabilities

CVE Alert: CVE-2025-30144

March 20, 2025

Vulnerability Summary: CVE-2025-30144 fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly...

Read MoreRead more about CVE Alert: CVE-2025-30144
image
  • Vulnerabilities

CVE Alert: CVE-2025-30153

March 20, 2025

Vulnerability Summary: CVE-2025-30153 kin-openapi is a Go project for handling OpenAPI files. Prior to 0.131.0, when validating a request with...

Read MoreRead more about CVE Alert: CVE-2025-30153
image
  • Vulnerabilities

CVE Alert: CVE-2024-53969

March 20, 2025

Vulnerability Summary: CVE-2024-53969 Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that...

Read MoreRead more about CVE Alert: CVE-2024-53969
image
  • Vulnerabilities

CVE Alert: CVE-2025-30152

March 20, 2025

Vulnerability Summary: CVE-2025-30152 The Syliud PayPal Plugin is the Sylius Core Team’s plugin for the PayPal Commerce Platform. Prior to...

Read MoreRead more about CVE Alert: CVE-2025-30152
image
  • Vulnerabilities

CVE Alert: CVE-2024-53970

March 20, 2025

Vulnerability Summary: CVE-2024-53970 Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that...

Read MoreRead more about CVE Alert: CVE-2024-53970
image
  • Vulnerabilities

CVE Alert: CVE-2024-53968

March 20, 2025

Vulnerability Summary: CVE-2024-53968 Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that...

Read MoreRead more about CVE Alert: CVE-2024-53968
image
  • Vulnerabilities

CVE Alert: CVE-2024-53967

March 20, 2025

Vulnerability Summary: CVE-2024-53967 Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that...

Read MoreRead more about CVE Alert: CVE-2024-53967
image
  • Vulnerabilities

CVE Alert: CVE-2024-25132

March 20, 2025

Vulnerability Summary: CVE-2024-25132 A flaw was found in the Hive hibernation controller component of OpenShift Dedicated. The ClusterDeployment.hive.openshift.io/v1 resource can...

Read MoreRead more about CVE Alert: CVE-2024-25132
image
  • Vulnerabilities

CVE Alert: CVE-2025-29118

March 20, 2025

Vulnerability Summary: CVE-2025-29118 Tenda AC8 V16.03.34.06 was discovered to contain a stack overflow via the src parameter in the function...

Read MoreRead more about CVE Alert: CVE-2025-29118
image
  • Vulnerabilities

CVE Alert: CVE-2025-0431

March 20, 2025

Vulnerability Summary: CVE-2025-0431 Enterprise Protection contains a vulnerability in URL rewriting that allows an unauthenticated remote attacker to send an...

Read MoreRead more about CVE Alert: CVE-2025-0431
image
  • Vulnerabilities

CVE Alert: CVE-2024-7631

March 20, 2025

Vulnerability Summary: CVE-2024-7631 A flaw was found in the OpenShift Console, an endpoint for plugins to serve resources in multiple...

Read MoreRead more about CVE Alert: CVE-2024-7631
image
  • Vulnerabilities

CVE Alert: CVE-2025-29405

March 20, 2025

Vulnerability Summary: CVE-2025-29405 An arbitrary file upload vulnerability in the component /admin/template.php of emlog pro 2.5.0 and pro 2.5.* allows...

Read MoreRead more about CVE Alert: CVE-2025-29405
image
  • Vulnerabilities

CVE Alert: CVE-2025-27415

March 20, 2025

Vulnerability Summary: CVE-2025-27415 Nuxt is an open-source web development framework for Vue.js. Prior to 3.16.0, by sending a crafted HTTP...

Read MoreRead more about CVE Alert: CVE-2025-27415
image
  • Vulnerabilities

CVE Alert: CVE-2024-51459

March 20, 2025

Vulnerability Summary: CVE-2024-51459 IBM InfoSphere Information Server 11.7 could allow a local user to execute privileged commands due to the...

Read MoreRead more about CVE Alert: CVE-2024-51459
image
  • Vulnerabilities

CVE Alert: CVE-2025-30258

March 20, 2025

Vulnerability Summary: CVE-2025-30258 In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data...

Read MoreRead more about CVE Alert: CVE-2025-30258
news
  • News
  • Premium Members Content

Agentic AI Will Accelerate Account Takeovers by 50%, Warns Gartner

March 20, 2025

Gartner predicts that agentic AI will significantly expedite account takeovers, allowing threat actors to hijack accounts more efficiently within two...

Read MoreRead more about Agentic AI Will Accelerate Account Takeovers by 50%, Warns Gartner
news
  • News
  • Premium Members Content

Europol Warns of Shadow Alliance: Criminals Team Up with States to Exploit Digital Threats

March 20, 2025

Europol has raised an alarming concern about a growing 'shadow alliance' between state actors and criminals, leveraging digital and AI...

Read MoreRead more about Europol Warns of Shadow Alliance: Criminals Team Up with States to Exploit Digital Threats

Posts pagination

Previous 1 … 425 426 427 428 429 430 431 … 4,369 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-43300 – Apple – macOS

August 21, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Spohn + Burkhardt GmbH & Co KG

August 21, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Blazer Building

August 21, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Burt Process Equipment

August 21, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: seabridge[.]eu+efico[.]com

August 21, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel