Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering IoT Security Strategies for a Safer Connected World

August 6, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Forensic Analysis in Cybersecurity

August 4, 2025
unlock_membership
  • Premium Members Content

Mastering Mobile Device Security in a Digital World

August 1, 2025
unlock_membership
  • Premium Members Content

Mastering Endpoint Protection Strategies for Cyber Defense

July 30, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communication

July 28, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 124[.]222[.]74[.]146:6666

August 6, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 124[.]222[.]74[.]146:6666
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 152[.]136[.]44[.]13:8001

August 6, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 152[.]136[.]44[.]13:8001
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: ridgefield[.]org

August 6, 2025

Ransomware Group: SAFEPAY VICTIM NAME: ridgefieldorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [SAFEPAY] – Ransomware Victim: ridgefield[.]org
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: cibraco

August 6, 2025

Ransomware Group: LYNX VICTIM NAME: cibraco NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [LYNX] – Ransomware Victim: cibraco
image
  • Vulnerabilities

CVE Alert: CVE-2025-5988

August 6, 2025

Vulnerability Summary: CVE-2025-5988 A flaw was found in the Ansible aap-gateway. Cross-site request forgery (CSRF) origin checking is not done...

Read MoreRead more about CVE Alert: CVE-2025-5988
image
  • Vulnerabilities

CVE Alert: CVE-2025-44955

August 6, 2025

Vulnerability Summary: CVE-2025-44955 RUCKUS Network Director (RND) before 4.5 allows jailed users to obtain root access vis a weak, hardcoded...

Read MoreRead more about CVE Alert: CVE-2025-44955
image
  • Vulnerabilities

CVE Alert: CVE-2025-8516

August 6, 2025

Vulnerability Summary: CVE-2025-8516 A vulnerability was found in Kingdee Cloud-Starry-Sky Enterprise Edition up to 8.2. It has been classified as...

Read MoreRead more about CVE Alert: CVE-2025-8516
image
  • Vulnerabilities

CVE Alert: CVE-2025-38739

August 6, 2025

Vulnerability Summary: CVE-2025-38739 Dell Digital Delivery, versions prior to 5.6.1.0, contains an Insufficiently Protected Credentials vulnerability. A remote unauthenticated attacker...

Read MoreRead more about CVE Alert: CVE-2025-38739
image
  • Vulnerabilities

CVE Alert: CVE-2025-8517

August 6, 2025

Vulnerability Summary: CVE-2025-8517 A vulnerability was found in givanz Vvveb 1.0.6.1. It has been declared as critical. Affected by this...

Read MoreRead more about CVE Alert: CVE-2025-8517
image
  • Vulnerabilities

CVE Alert: CVE-2025-44957

August 6, 2025

Vulnerability Summary: CVE-2025-44957 Ruckus SmartZone (SZ) before 6.1.2p3 Refresh Build allows authentication bypass via a valid API key and crafted...

Read MoreRead more about CVE Alert: CVE-2025-44957
image
  • Vulnerabilities

CVE Alert: CVE-2025-44954

August 6, 2025

Vulnerability Summary: CVE-2025-44954 RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build has a hardcoded SSH private key for a root-equivalent user...

Read MoreRead more about CVE Alert: CVE-2025-44954
image
  • Vulnerabilities

CVE Alert: CVE-2025-50422

August 6, 2025

Vulnerability Summary: CVE-2025-50422 An issue was discovered in freedesktop poppler v25.04.0. The heap memory containing PDF stream objects is not...

Read MoreRead more about CVE Alert: CVE-2025-50422
image
  • Vulnerabilities

CVE Alert: CVE-2025-44958

August 6, 2025

Vulnerability Summary: CVE-2025-44958 RUCKUS Network Director (RND) before 4.5 stores passwords in a recoverable format. Affected Endpoints: No affected endpoints...

Read MoreRead more about CVE Alert: CVE-2025-44958
image
  • Vulnerabilities

CVE Alert: CVE-2025-50420

August 6, 2025

Vulnerability Summary: CVE-2025-50420 An issue in the pdfseparate utility of freedesktop poppler v25.04.0 allows attackers to cause an infinite recursion...

Read MoreRead more about CVE Alert: CVE-2025-50420
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: Carrollton Ear Nose and Throat

August 5, 2025

Ransomware Group: INCRANSOM VICTIM NAME: Carrollton Ear Nose and Throat NOTE: No files or stolen information are by RedPacket Security....

Read MoreRead more about [INCRANSOM] – Ransomware Victim: Carrollton Ear Nose and Throat
image
  • Vulnerabilities

CVE Alert: CVE-2025-8518

August 5, 2025

Vulnerability Summary: CVE-2025-8518 A vulnerability was found in givanz Vvveb 1.0.5. It has been rated as critical. Affected by this...

Read MoreRead more about CVE Alert: CVE-2025-8518
image
  • Vulnerabilities

CVE Alert: CVE-2025-44960

August 5, 2025

Vulnerability Summary: CVE-2025-44960 RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows OS command injection via a certain parameter in an...

Read MoreRead more about CVE Alert: CVE-2025-44960
image
  • Vulnerabilities

CVE Alert: CVE-2025-44962

August 5, 2025

Vulnerability Summary: CVE-2025-44962 RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows ../ directory traversal to read files. Affected Endpoints: No...

Read MoreRead more about CVE Alert: CVE-2025-44962
image
  • Vulnerabilities

CVE Alert: CVE-2025-44963

August 5, 2025

Vulnerability Summary: CVE-2025-44963 RUCKUS Network Director (RND) before 4.5 allows spoofing of an administrator JWT by an attacker who knows...

Read MoreRead more about CVE Alert: CVE-2025-44963
image
  • Vulnerabilities

CVE Alert: CVE-2025-44961

August 5, 2025

Vulnerability Summary: CVE-2025-44961 In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address...

Read MoreRead more about CVE Alert: CVE-2025-44961
image
  • Vulnerabilities

CVE Alert: CVE-2025-8519

August 5, 2025

Vulnerability Summary: CVE-2025-8519 A vulnerability classified as problematic has been found in givanz Vvveb up to 1.0.5. This affects an...

Read MoreRead more about CVE Alert: CVE-2025-8519
image
  • Vulnerabilities

CVE Alert: CVE-2025-46206

August 5, 2025

Vulnerability Summary: CVE-2025-46206 An issue in Artifex mupdf 1.25.6, 1.25.5 allows a remote attacker to cause a denial of service...

Read MoreRead more about CVE Alert: CVE-2025-46206
image
  • Vulnerabilities

CVE Alert: CVE-2024-45183

August 5, 2025

Vulnerability Summary: CVE-2024-45183 An issue was discovered in Samsung Mobile Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, and 2400....

Read MoreRead more about CVE Alert: CVE-2024-45183
image
  • Vulnerabilities

CVE Alert: CVE-2025-8520

August 5, 2025

Vulnerability Summary: CVE-2025-8520 A vulnerability classified as critical was found in givanz Vvveb up to 1.0.5. This vulnerability affects unknown...

Read MoreRead more about CVE Alert: CVE-2025-8520

Posts pagination

Previous 1 … 4 5 6 7 8 9 10 … 4,321 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-30127

August 7, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8665

August 7, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-20332

August 7, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-38746

August 7, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8667

August 7, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel