Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]138[.]0[.]179:9443

May 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 43[.]138[.]0[.]179:9443
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 66[.]181[.]36[.]218:80

May 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 66[.]181[.]36[.]218:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]37[.]236[.]20:1111

May 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 101[.]37[.]236[.]20:1111
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 149[.]104[.]30[.]130:80

May 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 149[.]104[.]30[.]130:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 81[.]71[.]64[.]78:80

May 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 81[.]71[.]64[.]78:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 113[.]44[.]158[.]114:443

May 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 113[.]44[.]158[.]114:443
image
  • Vulnerabilities

CVE Alert: CVE-2025-46804

May 27, 2025

Vulnerability Summary: CVE-2025-46804 A minor information leak when running Screen with setuid-root privileges allosw unprivileged users to deduce information about...

Read MoreRead more about CVE Alert: CVE-2025-46804
image
  • Vulnerabilities

CVE Alert: CVE-2025-46805

May 27, 2025

Vulnerability Summary: CVE-2025-46805 Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP,...

Read MoreRead more about CVE Alert: CVE-2025-46805
image
  • Vulnerabilities

CVE Alert: CVE-2025-39498

May 27, 2025

Vulnerability Summary: CVE-2025-39498 Insertion of Sensitive Information Into Sent Data vulnerability in Spotlight Spotlight - Social Media Feeds (Premium) allows...

Read MoreRead more about CVE Alert: CVE-2025-39498
image
  • Vulnerabilities

CVE Alert: CVE-2025-5196

May 27, 2025

Vulnerability Summary: CVE-2025-5196 A vulnerability has been found in Wing FTP Server up to 7.4.3 and classified as critical. Affected...

Read MoreRead more about CVE Alert: CVE-2025-5196
image
  • Vulnerabilities

CVE Alert: CVE-2025-46803

May 27, 2025

Vulnerability Summary: CVE-2025-46803 The default mode of pseudo terminals (PTYs) allocated by Screen was changed from 0620 to 0622, thereby...

Read MoreRead more about CVE Alert: CVE-2025-46803
image
  • Vulnerabilities

CVE Alert: CVE-2025-5200

May 27, 2025

Vulnerability Summary: CVE-2025-5200 A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue...

Read MoreRead more about CVE Alert: CVE-2025-5200
image
  • Vulnerabilities

CVE Alert: CVE-2025-5201

May 27, 2025

Vulnerability Summary: CVE-2025-5201 A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as problematic....

Read MoreRead more about CVE Alert: CVE-2025-5201
image
  • Vulnerabilities

CVE Alert: CVE-2025-46802

May 27, 2025

Vulnerability Summary: CVE-2025-46802 For a short time they PTY is set to mode 666, allowing any user on the system...

Read MoreRead more about CVE Alert: CVE-2025-46802
image
  • Vulnerabilities

CVE Alert: CVE-2025-23392

May 27, 2025

Vulnerability Summary: CVE-2025-23392 A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in spacewalk-java allows...

Read MoreRead more about CVE Alert: CVE-2025-23392
image
  • Vulnerabilities

CVE Alert: CVE-2025-23395

May 27, 2025

Vulnerability Summary: CVE-2025-23395 Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user...

Read MoreRead more about CVE Alert: CVE-2025-23395
cybercrime
  • News

‘ongoing’ Ivanti Hijack Bug Exploitation Reaches Clouds

May 27, 2025

The "ongoing exploitation" of two Ivanti bugs has now extended beyond on-premises environments and hit customers' cloud instances, according to...

Read MoreRead more about ‘ongoing’ Ivanti Hijack Bug Exploitation Reaches Clouds
cybercrime
  • News

Microsoft Dumps Ai Into Notepad As ‘copilot All The Things’ Mania Takes Hold Inredmond

May 27, 2025

Microsoft has continued to shovel AI into its built-in Windows inbox apps, and now it's rolling out a Notepad update...

Read MoreRead more about Microsoft Dumps Ai Into Notepad As ‘copilot All The Things’ Mania Takes Hold Inredmond
cybercrime
  • News

Builder.ai Coded Itself Into A Corner – Now It’s Bankrupt

May 27, 2025

Comment The collapse of Builder.ai has cast fresh light on AI coding practices, despite the software company blaming its fall...

Read MoreRead more about Builder.ai Coded Itself Into A Corner – Now It’s Bankrupt
cybercrime
  • News

Signal Shuts The Blinds On Microsoft Recall With The Power Of Drm

May 27, 2025

Chat app biz Signal is unhappy with the current version of Microsoft Recall and has invoked some Digital Rights Management...

Read MoreRead more about Signal Shuts The Blinds On Microsoft Recall With The Power Of Drm
cybercrime
  • News

Ransomware Attack On Food Distributor Spells More Pain For Uk Supermarkets

May 27, 2025

It's more bad news for UK supermarkets with chilled and frozen food distribution business Peter Green Chilled confirming a ransomware...

Read MoreRead more about Ransomware Attack On Food Distributor Spells More Pain For Uk Supermarkets
cybercrime
  • News

Scattered Spider Snared Financial Orgs Before Targeting Shops In Britain,america

May 27, 2025

interview Scattered Spider snared financial services organizations in its web before its recent spate of retail attacks in the UK...

Read MoreRead more about Scattered Spider Snared Financial Orgs Before Targeting Shops In Britain,america
cybercrime
  • News

Apartment Living To Get Worse In 5 Years As 6 Ghz Wi Fi Nears ‘exhaustion’

May 27, 2025

Rapid growth in Wi-Fi use means the 6 GHz band’s carrying capacity may soon be exhausted, according to CableLabs, the...

Read MoreRead more about Apartment Living To Get Worse In 5 Years As 6 Ghz Wi Fi Nears ‘exhaustion’
cybercrime
  • News

‘ongoing’ Ivanti Hijack Bug Exploitation Reaches Clouds

May 27, 2025

The "ongoing exploitation" of two Ivanti bugs has now extended beyond on-premises environments and hit customers' cloud instances, according to...

Read MoreRead more about ‘ongoing’ Ivanti Hijack Bug Exploitation Reaches Clouds

Posts pagination

Previous 1 … 66 67 68 69 70 71 72 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel