Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Malicious commits found in PHP code repository: What you need to know

March 31, 2021

You’ve probably heard that PHP’s Git repository was recently compromised, allowing backdoors to be added to the code located there....

Read MoreRead more about Malicious commits found in PHP code repository: What you need to know
binary-2170630_1920
  • News

MIDC’s Server Hacked, Threat to Destroy Data

March 31, 2021

 The server of Maharashtra Industrial Development Corporation was hacked as of late. The ransomware 'SYNack' affected the applications and database...

Read MoreRead more about MIDC’s Server Hacked, Threat to Destroy Data
shahadat-rahman-BfrQnKBulYQ-unsplash-3
  • News

278,000 GitHub Repositories Affected by a Critical Networking Flaw in Netmask

March 31, 2021

 Security researchers have unearthed a critical networking flaw CVE-2021-28918 in a popular npm library netmask. Netmask is commonly utilized by...

Read MoreRead more about 278,000 GitHub Repositories Affected by a Critical Networking Flaw in Netmask
pexels-pixabay-256219
  • News

Live Broadcast Got Disrupted Due to Cyber-Attack on The Australian Tv Network- Nine

March 31, 2021

 A cyber-attack on Australia's Channel Nine TV network has interrupted live broadcasts, raising questions about the country's exposure to hackers....

Read MoreRead more about Live Broadcast Got Disrupted Due to Cyber-Attack on The Australian Tv Network- Nine
hacking-2903156_1920
  • News

PHP Git Server Hacked to Plant Malware in Code Base

March 31, 2021

 In the most recent software supply chain assault, the official PHP Git repository was hacked and the code base altered....

Read MoreRead more about PHP Git Server Hacked to Plant Malware in Code Base
sl_abstract_binary_wave-990x400-1
  • News

APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign

March 31, 2021

Why is the campaign called A41APT? In 2019, we observed an APT campaign targeting multiple industries, including the Japanese manufacturing...

Read MoreRead more about APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign
ClearURLs
  • Tools

ClearURLs – An Add-On Based On The New WebExtensions Technology And Will Automatically Remove Tracking Elements From URLs To Help Protect Your Privacy

March 31, 2021

ClearURLs is an add-on based on the new WebExtensions technology and is optimized for Firefox and Chrome based browsers. This...

Read MoreRead more about ClearURLs – An Add-On Based On The New WebExtensions Technology And Will Automatically Remove Tracking Elements From URLs To Help Protect Your Privacy
Android_Hid
  • Tools

Android_Hid – Use Android As Rubber Ducky Against Another Android Device

March 31, 2021

Use Android as Rubber Ducky against another Android device HID attack using AndroidUsing Android as Rubber Ducky against Android. This...

Read MoreRead more about Android_Hid – Use Android As Rubber Ducky Against Another Android Device
mdr
  • News

MDR Vendor Must-Haves, Part 3: Ingestion of Other Technology Investments

March 31, 2021

This blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights,...

Read MoreRead more about MDR Vendor Must-Haves, Part 3: Ingestion of Other Technology Investments
osint
  • News

Reflected XSS Vulnerability In “Ivory Search” WP Plugin Impact Over 60K sites

March 30, 2021

Researchers discovered a reflected XSS vulnerability in the Ivory Search WordPress Plugin installed on over 60,000 sites. On March 28,...

Read MoreRead more about Reflected XSS Vulnerability In “Ivory Search” WP Plugin Impact Over 60K sites
osint
  • News

Experts found 2 Linux Kernel flaws that can allow bypassing Spectre mitigations

March 30, 2021

Linux kernel recently fixed a couple of vulnerabilities that could allow an attacker to bypass mitigations designed to protect devices...

Read MoreRead more about Experts found 2 Linux Kernel flaws that can allow bypassing Spectre mitigations
osint
  • News

Hundreds of thousands of projects affected by a flaw in netmask npm package

March 30, 2021

A vulnerability in the netmask npm package, tracked as CVE-2021-28918, could be exploited by attackers to conduct a variety of...

Read MoreRead more about Hundreds of thousands of projects affected by a flaw in netmask npm package
osint
  • News

30 Docker images downloaded 20M times in cryptojacking attacks

March 30, 2021

Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo...

Read MoreRead more about 30 Docker images downloaded 20M times in cryptojacking attacks
osint
  • News

London-based academies Harris Federation hit by ransomware attack

March 30, 2021

Harris Federation, the multi-academy trust of 50 primary and secondary academies in and around London, was hit by a ransomware...

Read MoreRead more about London-based academies Harris Federation hit by ransomware attack
osint
  • News

China-linked RedEcho APT took down part of its C2 domains

March 30, 2021

China-linked APT group RedEcho has taken down its attack infrastructure after it was exposed at the end of February by...

Read MoreRead more about China-linked RedEcho APT took down part of its C2 domains
CVE-prog
  • Vulnerabilities

CVE-2020-23162

March 30, 2021

Summary: Sensitive information disclosure and weak encryption in Pyrescom Termod4 time management devices before 10.04k allows remote attackers to read...

Read MoreRead more about CVE-2020-23162
CVE-prog
  • Vulnerabilities

CVE-2020-16964

March 30, 2021

Summary: Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963....

Read MoreRead more about CVE-2020-16964
CVE-prog
  • Vulnerabilities

CVE-2021-1373

March 30, 2021

Summary: A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Wireless...

Read MoreRead more about CVE-2021-1373
CVE-prog
  • Vulnerabilities

CVE-2019-16869

March 30, 2021

Summary: Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which...

Read MoreRead more about CVE-2019-16869
CVE-prog
  • Vulnerabilities

CVE-2020-14209

March 30, 2021

Summary: Dolibarr before 11.0.5 allows low-privilege users to upload files of dangerous types, leading to arbitrary code execution. This occurs...

Read MoreRead more about CVE-2020-14209
osint
  • News

The one reason your iPhone needs a VPN

March 30, 2021

For years, Apple has marketed its iPhone as the more secure, more private option when compared to other smart phones,...

Read MoreRead more about The one reason your iPhone needs a VPN
osint
  • News

5G slicing vulnerability could be used in DoS attacks

March 30, 2021

The IT security researchers at AdaptiveMobile have called out what looks like an important vulnerability in the architecture of 5G...

Read MoreRead more about 5G slicing vulnerability could be used in DoS attacks
57m9a2yu7hn61-422x600-1
  • News

Steam users: Don’t fall for the “I accidentally reported you” scam

March 30, 2021

Suppose that, out of the blue, a Steam user tells you they’ve accidentally reported you for something you didn’t do,...

Read MoreRead more about Steam users: Don’t fall for the “I accidentally reported you” scam
pietro-jeng-n6B49lTx7NM-unsplash-5
  • News

Beware of Ongoing Brute-Force Attacks Against NAS Devices, QNAP Warns

March 30, 2021

 Taiwanese firm, QNAP has warned its clients of ongoing attacks targeting QNAP NAS (network-attached storage) devices and urged to strengthen...

Read MoreRead more about Beware of Ongoing Brute-Force Attacks Against NAS Devices, QNAP Warns

Posts pagination

Previous 1 … 4,321 4,322 4,323 4,324 4,325 4,326 4,327 … 4,517 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-21042 – Samsung Mobile – Samsung Mobile Devices

November 10, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Darvin Furniture

November 10, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: OMS

November 10, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Garvin Promotion Group

November 10, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Kwik Mix Materials

November 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel