Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
patches-2
  • News

Patch Tuesday – January 2021

January 13, 2021

We arrive at the first Patch Tuesday of 2021 (2021-Jan) with 83 vulnerabilities across our standard spread of products.  Windows...

Read MoreRead more about Patch Tuesday – January 2021
mail-359x600-1
  • News

Ubiquiti breach, and other IoT security problems

January 13, 2021

Networking equipment manufacturer Ubiquiti sent out an email to warn users about a possible data breach. The email stated there...

Read MoreRead more about Ubiquiti breach, and other IoT security problems
pietro-jeng-n6B49lTx7NM-unsplash-1
  • News

Cyber Attackers Targets the Montreal Car-Sharing Service Communauto

January 13, 2021

 Threat actors targeted the Montreal-based car-sharing service Communauto but they were unable to get their hands on the sensitive information...

Read MoreRead more about Cyber Attackers Targets the Montreal Car-Sharing Service Communauto
hacker-5842975_1280
  • News

The data of 1.3 million Russian Hyundai customers are on sale

January 13, 2021

The database, which contains information about 1.3 million Russian owners of Hyundai cars, is put up for sale on Darknet....

Read MoreRead more about The data of 1.3 million Russian Hyundai customers are on sale
yogas-design-rPzEQ7tTRr8-unsplash
  • News

Korean Dating App Leaks Private Images and Information of 1 Million Users

January 13, 2021

 Korea is a country where incidents of data breach have significantly risen in number, becoming the new normal. Due to...

Read MoreRead more about Korean Dating App Leaks Private Images and Information of 1 Million Users
coding-1841550_1920
  • News

Typeform Patched an Information Hijacking Vulnerability

January 13, 2021

 Online survey and form creation tool Typeform allows clients to make website pages for easy information gathering from clients. Each...

Read MoreRead more about Typeform Patched an Information Hijacking Vulnerability
ProtOSINT_1_protosint
  • News

ProtOSINT – A Python Script That Helps You Investigate Protonmail Accounts And ProtonVPN IP Addresses

January 13, 2021

ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.DescriptionThis tool can help you in...

Read MoreRead more about ProtOSINT – A Python Script That Helps You Investigate Protonmail Accounts And ProtonVPN IP Addresses
sigurls
  • News

Sigurls – A Reconnaissance Tool, It Fetches URLs From AlienVault’s OTX, Common Crawl, URLScan, Github And The Wayback Machine

January 13, 2021

sigurls is a reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine.UsageTo display...

Read MoreRead more about Sigurls – A Reconnaissance Tool, It Fetches URLs From AlienVault’s OTX, Common Crawl, URLScan, Github And The Wayback Machine
sunspot
  • News

Update on SolarWinds Supply-Chain Attack: SUNSPOT and New Malware Family Associations

January 13, 2021

This update is a continuation of our previous coverage of the SolarWinds supply-chain attack that was discovered by FireEye in...

Read MoreRead more about Update on SolarWinds Supply-Chain Attack: SUNSPOT and New Malware Family Associations
osint
  • News

Sunspot, the third malware involved in the SolarWinds supply chain attack

January 12, 2021

Cybersecurity firm CrowdStrike announced to have discovered a third malware strain, named Sunspot, directly involved in the SolarWinds supply chain...

Read MoreRead more about Sunspot, the third malware involved in the SolarWinds supply chain attack
1f195
  • News

Bitdefender releases free decrypter for Darkside ransomware

January 12, 2021

Security firm Bitdefender released a tool that allows victims of the Darkside ransomware to recover their files without paying the...

Read MoreRead more about Bitdefender releases free decrypter for Darkside ransomware
osint
  • News

Ubiquiti discloses a data breach

January 12, 2021

American technology company Ubiquiti Networks is disclosed a data breach and is notifying its customers via email. American technology vendor...

Read MoreRead more about Ubiquiti discloses a data breach
osint
  • News

Connecting the dots between SolarWinds and Russia-linked Turla APT

January 12, 2021

Experts have found some similarities between the Sunburst backdoor used in the SolarWinds supply chain attack and Turla’s backdoor Kazuar. Security experts...

Read MoreRead more about Connecting the dots between SolarWinds and Russia-linked Turla APT
CVE-prog
  • Vulnerabilities

CVE-2021-21116

January 12, 2021

Summary: Heap buffer overflow in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap...

Read MoreRead more about CVE-2021-21116
CVE-prog
  • Vulnerabilities

CVE-2020-16021

January 12, 2021

Summary: Race in image burner in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised...

Read MoreRead more about CVE-2020-16021
CVE-prog
  • Vulnerabilities

CVE-2017-20001

January 12, 2021

Summary: The AES encryption project 7.x and 8.x for Drupal does not sufficiently prevent attackers from decrypting data, aka SA-CONTRIB-2017-027....

Read MoreRead more about CVE-2017-20001
CVE-prog
  • Vulnerabilities

CVE-2020-36154

January 12, 2021

Summary: The Application Wrapper in Pearson VUE VTS Installer 2.3.1911 has Full Control permissions for Everyone in the "%SYSTEMDRIVE%\Pearson VUE"...

Read MoreRead more about CVE-2020-36154
CVE-prog
  • Vulnerabilities

CVE-2020-36161

January 12, 2021

Summary: An issue was discovered in Veritas APTARE 10.4 before 10.4P9 and 10.5 before 10.5P3. By default, on Windows systems,...

Read MoreRead more about CVE-2020-36161
osint
  • News

A week in security (January 4 – January 10)

January 12, 2021

Last week on Malwarebytes Labs, we released survey results about VPN usage and found that 36 percent of our respondents...

Read MoreRead more about A week in security (January 4 – January 10)
bugbounty
  • Tutorials

Bug Bounty API Key Testing CheatSheet

January 12, 2021

Arrrrgh, Bug Bounty! Slack Webhook If the below command returns missing_text_or_fallback_or_attachments, it means that the URL is valid, any other responses...

Read MoreRead more about Bug Bounty API Key Testing CheatSheet
sai-kiran-anagani-5Ntkpxqt54Y-unsplash
  • News

JetBrains – A possible Doorway to Massive Hacking Plot?

January 12, 2021

 JetBrains a software company based in the Czech Republic could possibly be used as a doorway by Russian hackers to...

Read MoreRead more about JetBrains – A possible Doorway to Massive Hacking Plot?
lindsey-lamont-UwnH5jSrdr4-unsplash
  • News

Singapore Witnessed a Sudden Surge in the Bank-Related Phishing Scam

January 12, 2021

 Phishing emails are scams where the actors try to befool the user by sending emails that may concern the user....

Read MoreRead more about Singapore Witnessed a Sudden Surge in the Bank-Related Phishing Scam
trump-2815558_1920
  • News

Parler on the Verge of Permanent Expulsion

January 12, 2021

 Launched in 2018, Parler has become a place of refuge for individuals that have been prohibited or suspended by popular...

Read MoreRead more about Parler on the Verge of Permanent Expulsion
abstract_sunburst_kazuar-990x400-1
  • News

Sunburst backdoor – code overlaps with Kazuar

January 12, 2021

Introduction On December 13, 2020, FireEye published a blog post detailing a supply chain attack leveraging Orion IT, an infrastructure...

Read MoreRead more about Sunburst backdoor – code overlaps with Kazuar

Posts pagination

Previous 1 … 4,384 4,385 4,386 4,387 4,388 4,389 4,390 … 4,522 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-59511 – Microsoft – Windows 10 Version 1809

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59512 – Microsoft – Windows 10 Version 1809

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59507 – Microsoft – Windows 10 Version 1809

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59508 – Microsoft – Windows 10 Version 1809

November 12, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-59514 – Microsoft – Windows 10 Version 1809

November 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel