Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025
unlock_membership
  • Premium Members Content

Mastering IoT Security Strategies for a Safer Connected World

August 6, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Forensic Analysis in Cybersecurity

August 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
DigiTrack_1
  • News

DigiTrack – Attacks For $5 Or Less Using Arduino

April 3, 2020

In 30 seconds, this attack can learn which networks a MacOS computer has connected to before, and plant a script...

Read MoreRead more about DigiTrack – Attacks For $5 Or Less Using Arduino
Webcam
  • News

Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities

April 3, 2020

Wow, this past week has been a pretty long year for Zoom.As the COVID-19 global pandemic moved the whole knowledge-working...

Read MoreRead more about Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities
soar-siem-acceleratino
  • News

SOC Automation: Accelerate Threat Detection and Response with SIEM and SOAR

April 3, 2020

At Rapid7, we have the opportunity to talk to security professionals from all types of organizations. Whether we’re conversing with...

Read MoreRead more about SOC Automation: Accelerate Threat Detection and Response with SIEM and SOAR
osint
  • News

GDPR: An impact around the world

April 2, 2020

A little more than one month after the European Union enacted the General Data Protection Regulation (GDPR) to extend new...

Read MoreRead more about GDPR: An impact around the world
webinar-4216601_1280
  • News

Hackers use fake Zoom domains to spread malware

April 2, 2020

The coronavirus pandemic is forcing many people around the world to work remotely. This has significantly increased the popularity of...

Read MoreRead more about Hackers use fake Zoom domains to spread malware
osint
  • News

Zeus Sphinx Malware Reappears amid Coronavirus Phishing Scams

April 2, 2020

In this particular scam, the recipients receive phishing emails asking them to donate money by filling forms for coronavirus or...

Read MoreRead more about Zeus Sphinx Malware Reappears amid Coronavirus Phishing Scams
osint
  • News

Hackers use Bill Gates themed video to sell off Ponzi Crypto Scheme

April 2, 2020

Recently, tens of YouTube accounts were hacked to broadcast a Ponzi cryptocurrency scheme by renaming the hacked YouTube accounts as...

Read MoreRead more about Hackers use Bill Gates themed video to sell off Ponzi Crypto Scheme
fprobe
  • News

FProbe – Take A List Of Domains/Subdomains And Probe For Working HTTP/HTTPS Server

April 2, 2020

FProbe - Fast HTTP ProbeInstallationGO111MODULE=on go get -u github.com/theblackturtle/fprobeFeaturesTake a list of domains/subdomains and probe for working http/https server.Optimize RAM...

Read MoreRead more about FProbe – Take A List Of Domains/Subdomains And Probe For Working HTTP/HTTPS Server
mssqli-duet_1_plugin-demo
  • News

MSSQLi-DUET – SQL Injection Script For MSSQL That Extracts Domain Users From An Active Directory Environment Based On RID Bruteforcing

April 2, 2020

SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing. Supports various...

Read MoreRead more about MSSQLi-DUET – SQL Injection Script For MSSQL That Extracts Domain Users From An Active Directory Environment Based On RID Bruteforcing
how-to-measurably-reduce-false-positives-vulnerability-management-cybersecurity
  • News

How to Measurably Reduce False Positive Vulnerabilities by Up To 22%

April 2, 2020

If you’ve been in the security industry for any amount of time, you’re no stranger to false positives. They show...

Read MoreRead more about How to Measurably Reduce False Positive Vulnerabilities by Up To 22%
Malware-200x125-1
  • News

Raccoon Stealer’s Abuse of Google Cloud Services and Multiple Delivery Techniques

April 1, 2020

With additional insights/analysis from Augusto Remillano II and Don Ovid Ladores Raccoon emerged as Malware as a Service (MaaS) last...

Read MoreRead more about Raccoon Stealer’s Abuse of Google Cloud Services and Multiple Delivery Techniques
osint
  • News

Important tips for safe online shopping post COVID-19

April 1, 2020

As more and more countries order their citizens inside in response to COVID-19, online shopping—already a widespread practice—has surged in...

Read MoreRead more about Important tips for safe online shopping post COVID-19
code-1486361_1280
  • News

Hackers switched from direct theft of money to gaining control over the infrastructure of companies

April 1, 2020

According to the report by Rostelecom Solar JSOC, hackers changed the focus of attacks, switching from direct theft of money...

Read MoreRead more about Hackers switched from direct theft of money to gaining control over the infrastructure of companies
hacking_laptop-social-media1
  • News

A Rise in New Cyberspying by a Suspected Chinese Group Detected By a U.S Cybersecurity Firm

April 1, 2020

A surge in new cyberspying by a speculated Chinese group that dates as far back as to late January was...

Read MoreRead more about A Rise in New Cyberspying by a Suspected Chinese Group Detected By a U.S Cybersecurity Firm
Screenshot2B2528362529
  • News

This COVID-19 Website By Google Tells You All You Need To Know About Coronavirus!

April 1, 2020

The first step anyone took after hearing the first of the Coronavirus was ‘Googling’ it. Google has been a solution,...

Read MoreRead more about This COVID-19 Website By Google Tells You All You Need To Know About Coronavirus!
whatsapp-2317207_1280
  • News

WhatsApp’s Latest Feature will Let Users Verify Forwarded Messages on Google

April 1, 2020

Owing to the lockdown due to the outbreak of the global pandemic Covid-19, people are once again resorting to their...

Read MoreRead more about WhatsApp’s Latest Feature will Let Users Verify Forwarded Messages on Google
abstract-polygon-990x400-1
  • News

Holy water: ongoing targeted water-holing attack in Asia

April 1, 2020

On December 4, 2019, we discovered watering hole websites that were compromised to selectively trigger a drive-by download attack with...

Read MoreRead more about Holy water: ongoing targeted water-holing attack in Asia
awspx
  • News

Awspx – A Graph-Based Tool For Visualizing Effective Access And Resource Relationships In AWS Environments

April 1, 2020

auspex noun: An augur of ancient Rome, especially one who interpreted omens derived from the observation of birds.awspx is a...

Read MoreRead more about Awspx – A Graph-Based Tool For Visualizing Effective Access And Resource Relationships In AWS Environments
pulsar_6_pulsar-banner
  • News

Pulsar – Network Footprint Scanner Platform – Discover Domains And Run Your Custom Checks Periodically

April 1, 2020

Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. Its focused on discovery of organization...

Read MoreRead more about Pulsar – Network Footprint Scanner Platform – Discover Domains And Run Your Custom Checks Periodically
Podcast
  • News

A Chat with Jonathan Cran About Intrigue and Security in the COVID-19 Pandemic

April 1, 2020

In a recent episode of Rapid7’s podcast, Security Nation, we talked with Jonathan Cran, Head of Research at Kenna Security....

Read MoreRead more about A Chat with Jonathan Cran About Intrigue and Security in the COVID-19 Pandemic
osint
  • News

Sale of Dharma ransomware source code draws hackers’ scrutiny, but the price is right

March 31, 2020

An unidentified party has reportedly placed the source code for Dharma ransomware up for sale on at least two Russian...

Read MoreRead more about Sale of Dharma ransomware source code draws hackers’ scrutiny, but the price is right
osint
  • News

Lock and Code S1Ep3: Dishing on data privacy with Adam Kujawa

March 31, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep3: Dishing on data privacy with Adam Kujawa
rdp
  • News

Security Experts say number of network nodes in the Russian Federation accessible via RDP

March 31, 2020

Positive Technologies experts said that the number of network nodes in the Russian Federation accessible via the Remote Desktop Protocol...

Read MoreRead more about Security Experts say number of network nodes in the Russian Federation accessible via RDP
osint
  • News

6 Simple Tricks to Prevent your Smartphone from Hackers

March 31, 2020

If hackers trespass into your smartphones, they can send fake emails, fake alerts using your camera, and even control user...

Read MoreRead more about 6 Simple Tricks to Prevent your Smartphone from Hackers

Posts pagination

Previous 1 … 4,284 4,285 4,286 4,287 4,288 4,289 4,290 … 4,326 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

HIBP-Banner-1
  • Data Breach

Unigame – 843,696 breached accounts

August 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54785

August 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54788

August 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-54786

August 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8582

August 9, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel