Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Mobile Device Security in a Digital World

August 1, 2025
unlock_membership
  • Premium Members Content

Mastering Endpoint Protection Strategies for Cyber Defense

July 30, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communication

July 28, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing to Protect Your Digital Assets

July 25, 2025
PODCAST-Patreon
  • Offensive Security
  • Premium Members Content

[PODCAST] TruffleHog: Leaked Credential Discovery and Analysis

July 24, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
cybercrime
  • News

Flock Storage: Audio Boffin Encodes Data In A Starling

August 1, 2025

Forget flash storage – flock storage is here after it was demonstrated that data can be saved to a bird.Proof...

Read MoreRead more about Flock Storage: Audio Boffin Encodes Data In A Starling
cybercrime
  • News

Cisa Caves To Wyden, Agrees To Release Us Telco Insecurity Report But Won’tsay When

August 1, 2025

The US Cybersecurity and Infrastructure Security Agency on Tuesday finally agreed to make public an unclassified report from 2022 about...

Read MoreRead more about Cisa Caves To Wyden, Agrees To Release Us Telco Insecurity Report But Won’tsay When
cybercrime
  • News

The Tsa Likes Facial Recognition At Airports. Passengers And Politicians, Not Somuch

August 1, 2025

US lawmakers are trying to extend the use of facial recognition at airports, despite many airline passengers objecting to the...

Read MoreRead more about The Tsa Likes Facial Recognition At Airports. Passengers And Politicians, Not Somuch
cybercrime
  • News

Australia’s Attempt To Join The Space Race Lasts Just 14 Seconds

August 1, 2025

Australia’s attempt to return to space lasted just 14 seconds, after a Wednesday launch barely made it off the ground.The...

Read MoreRead more about Australia’s Attempt To Join The Space Race Lasts Just 14 Seconds
cybercrime
  • News

Europe’s Ai Crackdown Starts This Week And Big Tech Isn’t Happy

August 1, 2025

It is a little more than four years since the European Union first proposed legislation to govern tech companies that...

Read MoreRead more about Europe’s Ai Crackdown Starts This Week And Big Tech Isn’t Happy
cybercrime
  • News

Oracle Virtualbox Licensing Tweak Lies In Wait For The Unwary

August 1, 2025

Oracle has introduced new licensing terms that some users may see as hidden within the terms for VirtualBox, the general-purpose...

Read MoreRead more about Oracle Virtualbox Licensing Tweak Lies In Wait For The Unwary
cybercrime
  • News

Florida Man Earns Five Year Sentence For $100 Million Telco Fraud

August 1, 2025

The former CEO of Florida telco Q Link will spend up to five years in jail after attempting to steal...

Read MoreRead more about Florida Man Earns Five Year Sentence For $100 Million Telco Fraud
cybercrime
  • News

Users Left Scrambling For A Plan B As Dropbox Drops Dropbox Passwords

August 1, 2025

Dropbox has given users of its password manager until the end of October to extract their data before pulling the...

Read MoreRead more about Users Left Scrambling For A Plan B As Dropbox Drops Dropbox Passwords
cybercrime
  • News

Nhs Disability Equipment Provider On Brink Of Collapse A Year After Cyberattack

August 1, 2025

A major supplier of healthcare equipment to the UK's National Health Service and local councils is on the verge of...

Read MoreRead more about Nhs Disability Equipment Provider On Brink Of Collapse A Year After Cyberattack
cybercrime
  • News

Banning Vpns To Protect Kids? Good Luck With That

August 1, 2025

Analysis With the UK's Online Safety Act (OSA) now in effect, it was only a matter of time before tech-savvy...

Read MoreRead more about Banning Vpns To Protect Kids? Good Luck With That
cybercrime
  • News

Minnesota Governor Calls In The Troops After St Paul Cyberattack

August 1, 2025

Minnesota Governor Tim Walz has activated the state's National Guard and declared a state of emergency in response to a...

Read MoreRead more about Minnesota Governor Calls In The Troops After St Paul Cyberattack
cybercrime
  • News

As Ransomware Gangs Threaten Physical Harm, ‘i Am Afraid Of What’s Next,’ex Negotiator Says

August 1, 2025

Ransomware gangs now frequently threaten physical violence against employees and their families as a way to force victim organizations into...

Read MoreRead more about As Ransomware Gangs Threaten Physical Harm, ‘i Am Afraid Of What’s Next,’ex Negotiator Says
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security in a Digital World

August 1, 2025

In today's hyper-connected world, mobile devices are an integral part of our lives. From personal communication to banking and work,...

Read MoreRead more about Mastering Mobile Device Security in a Digital World
HIBP-Banner-1
  • Data Breach

Pi-hole – 29,926 breached accounts

August 1, 2025

HIBP In July 2025, a vulnerability in the GiveWP WordPress plugin exposed the names and email addresses of approximately 30k...

Read MoreRead more about Pi-hole – 29,926 breached accounts
image
  • Vulnerabilities

CVE Alert: CVE-2025-52567

August 1, 2025

Vulnerability Summary: CVE-2025-52567 GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses...

Read MoreRead more about CVE Alert: CVE-2025-52567
image
  • Vulnerabilities

CVE Alert: CVE-2025-54425

August 1, 2025

Vulnerability Summary: CVE-2025-54425 Umbraco is an ASP.NET CMS. In versions 13.0.0 through 13.9.2, 15.0.0 through 15.4.1 and 16.0.0 through 16.1.0,...

Read MoreRead more about CVE Alert: CVE-2025-54425
image
  • Vulnerabilities

CVE Alert: CVE-2025-54430

August 1, 2025

Vulnerability Summary: CVE-2025-54430 dedupe is a python library that uses machine learning to perform fuzzy matching, deduplication and entity resolution...

Read MoreRead more about CVE Alert: CVE-2025-54430
image
  • Vulnerabilities

CVE Alert: CVE-2024-45515

August 1, 2025

Vulnerability Summary: CVE-2024-45515 An issue was discovered in Zimbra Collaboration (ZCS) through 10.1. A Cross-Site Scripting (XSS) vulnerability exists in...

Read MoreRead more about CVE Alert: CVE-2024-45515
image
  • Vulnerabilities

CVE Alert: CVE-2025-46811

August 1, 2025

Vulnerability Summary: CVE-2025-46811 A Missing Authentication for Critical Function vulnerability in SUSE Manager allows anyone with access to the websocket...

Read MoreRead more about CVE Alert: CVE-2025-46811
image
  • Vulnerabilities

CVE Alert: CVE-2025-53113

August 1, 2025

Vulnerability Summary: CVE-2025-53113 GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software...

Read MoreRead more about CVE Alert: CVE-2025-53113
image
  • Vulnerabilities

CVE Alert: CVE-2025-53944

August 1, 2025

Vulnerability Summary: CVE-2025-53944 AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents. In...

Read MoreRead more about CVE Alert: CVE-2025-53944
image
  • Vulnerabilities

CVE Alert: CVE-2025-54573

August 1, 2025

Vulnerability Summary: CVE-2025-54573 CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.1.0...

Read MoreRead more about CVE Alert: CVE-2025-54573
image
  • Vulnerabilities

CVE Alert: CVE-2025-53111

August 1, 2025

Vulnerability Summary: CVE-2025-53111 GLPI is a Free Asset and IT Management Software package. In versions 0.80 through 10.0.18, a lack...

Read MoreRead more about CVE Alert: CVE-2025-53111
image
  • Vulnerabilities

CVE Alert: CVE-2025-53112

August 1, 2025

Vulnerability Summary: CVE-2025-53112 GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses...

Read MoreRead more about CVE Alert: CVE-2025-53112

Posts pagination

Previous 1 2 3 4 5 6 7 8 … 4,304 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-8480

August 2, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8477

August 2, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6037

August 2, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6015

August 2, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8472

August 2, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel