Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Researchers warn of a surge in cyber attacks against Microsoft Exchange

March 12, 2021

Researchers warn of a surge in cyber attacks against Microsoft Exchange servers exploiting the recently disclosed ProxyLogon vulnerabilities. Researchers at...

Read MoreRead more about Researchers warn of a surge in cyber attacks against Microsoft Exchange
osint
  • News

Malspam campaign uses icon files to delivers NanoCore RAT

March 12, 2021

Researchers at Trustwave spotted a new malspam campaign that is abusing icon files to trick victims into installing the NanoCore...

Read MoreRead more about Malspam campaign uses icon files to delivers NanoCore RAT
1f6a8
  • News

Expert publishes PoC exploit code for Microsoft Exchange flaws

March 12, 2021

This week a security researcher published on GitHub a proof-of-concept tool to hack Microsoft Exchange servers chaining two of ProxyLogon...

Read MoreRead more about Expert publishes PoC exploit code for Microsoft Exchange flaws
image-18
  • Hack The Box
  • Premium Members Content

Hack the box guide to: Phonebook

March 12, 2021

Phonebook - 30 points So at always lets fire up burp and visit the page to see what is there...

Read MoreRead more about Hack the box guide to: Phonebook
CVE-prog
  • Vulnerabilities

CVE-2020-27869

March 12, 2021

Summary: This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM:...

Read MoreRead more about CVE-2020-27869
CVE-prog
  • Vulnerabilities

CVE-2020-27871

March 12, 2021

Summary: This vulnerability allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1. Although authentication...

Read MoreRead more about CVE-2020-27871
CVE-prog
  • Vulnerabilities

CVE-2020-27874

March 12, 2021

Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is...

Read MoreRead more about CVE-2020-27874
CVE-prog
  • Vulnerabilities

CVE-2020-29020

March 12, 2021

Summary: Improper Access Control vulnerability in web service of Secomea SiteManager allows remote attacker to access the web UI from...

Read MoreRead more about CVE-2020-29020
CVE-prog
  • Vulnerabilities

CVE-2020-29032

March 12, 2021

Summary: Upload of Code Without Integrity Check vulnerability in firmware archive of Secomea GateManager allows authenticated attacker to execute malicious...

Read MoreRead more about CVE-2020-29032
SKY_ECC_statement-600x393-1
  • News

Police credit “unlocked” SKY ECC encryption for organized crime bust

March 12, 2021

At the moment, I’m really torn, and I need your help. Let me tell you what is going on. I...

Read MoreRead more about Police credit “unlocked” SKY ECC encryption for organized crime bust
server_choices-318x600-1
  • News

5 common VPN myths busted

March 12, 2021

Virtual Private Networks (VPNs) are popular but often misunderstood. There are many misconceptions about them—misconceptions that may be stopping people...

Read MoreRead more about 5 common VPN myths busted
cell-phone-1245663_1280
  • News

Russian authorities slow access to Twitter over banned content

March 12, 2021

 The Federal Service for Supervision of Communications, Information Technology and Mass Media (Roskomnadzor)  accused Twitter of numerous violations and failure...

Read MoreRead more about Russian authorities slow access to Twitter over banned content
sara-kurfess-B4ndBW2R_Q8-unsplash
  • News

After OTP Issues,TRAI Suspends New SMS Rules For 7 Days

March 12, 2021

 The Telecom Regulatory Authority of India (TRAI) has temporarily suspended its new rules for curbing spam messages, following major disruptions...

Read MoreRead more about After OTP Issues,TRAI Suspends New SMS Rules For 7 Days
malicious-code-4036349_1920
  • News

Malware WannaCry And Vulnerability EternalBlue Remain at Large

March 12, 2021

 One specific aspect of malware and one vulnerability continues to develop as security companies have been reconstructing the highest trends...

Read MoreRead more about Malware WannaCry And Vulnerability EternalBlue Remain at Large
logo-2582757_1920
  • News

GitHub Informed Clients of “Potentially Serious” Security Bug

March 12, 2021

 GitHub on Monday informed clients that it had found what it described as an “extremely rare, but potentially serious” security...

Read MoreRead more about GitHub Informed Clients of “Potentially Serious” Security Bug
Email-Bg-Vulnerability-Intel-Report-2020
  • News

Introducing the 2020 Vulnerability Intelligence Report: 50 CVEs that Made Headlines in 2020

March 12, 2021

2020 was a tumultuous year for vulnerability risk management. Defenders had to contend with a growing volume of high-priority security...

Read MoreRead more about Introducing the 2020 Vulnerability Intelligence Report: 50 CVEs that Made Headlines in 2020
osint
  • News

Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws

March 11, 2021

Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway...

Read MoreRead more about Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws
osint
  • News

RedXOR, a new powerful Linux backdoor in Winnti APT arsenal

March 11, 2021

Intezer experts have spotted a new strain of Linux backdoor dubbed RedXOR that is believed to be part of the...

Read MoreRead more about RedXOR, a new powerful Linux backdoor in Winnti APT arsenal
osint
  • News

F5 addresses critical vulnerabilities in BIG-IP and BIG-IQ

March 11, 2021

Security firm F5 announced the availability of patches for seven vulnerabilities in BIG-IP, four of which have been rated as...

Read MoreRead more about F5 addresses critical vulnerabilities in BIG-IP and BIG-IQ
osint
  • News

White hat hackers gained access more than 150,000 surveillance cameras

March 11, 2021

A group of hackers claimed to have compromised more than 150,000 surveillance cameras at banks, jails, schools, and prominent companies...

Read MoreRead more about White hat hackers gained access more than 150,000 surveillance cameras
CVE-prog
  • Vulnerabilities

CVE-2021-27963

March 11, 2021

Summary: SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g., SuperAdmin). An anonymous user can...

Read MoreRead more about CVE-2021-27963
CVE-prog
  • Vulnerabilities

CVE-2021-26963

March 11, 2021

Summary: A remote authenticated arbitrary command execution vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Vulnerabilities...

Read MoreRead more about CVE-2021-26963
CVE-prog
  • Vulnerabilities

CVE-2021-26962

March 11, 2021

Summary: A remote authenticated arbitrary command execution vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Vulnerabilities...

Read MoreRead more about CVE-2021-26962
CVE-prog
  • Vulnerabilities

CVE-2021-26961

March 11, 2021

Summary: A remote unauthenticated cross-site request forgery (csrf) vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0....

Read MoreRead more about CVE-2021-26961

Posts pagination

Previous 1 … 4,337 4,338 4,339 4,340 4,341 4,342 4,343 … 4,519 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

cybercrime
  • News

Spacex And Musk Called On To Rescue China’s Shenzhou 20 Crew

November 11, 2025
cybercrime
  • News

De Duplicating The Desktops: Let’s Come Together, Right Now

November 11, 2025
cybercrime
  • News

Techie Ran Up $40,000 Bill Trying To Download A Driver

November 11, 2025
cybercrime
  • News

Europe To Decide If 6 Ghz Is Shared Between Wi Fi And Cellular Networks

November 11, 2025
cybercrime
  • News

Data Breach At Chinese Infosec Firm Reveals Cyber Weapons And Target List

November 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel