Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025
unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Vulnerabilities

CVE Alert: CVE-2024-11643

December 5, 2024

Vulnerability Summary: CVE-2024-11643 The Accessibility by AllAccessible plugin for WordPress is vulnerable to unauthorized modification of data that can lead...

Read MoreRead more about CVE Alert: CVE-2024-11643
image
  • Vulnerabilities

CVE Alert: CVE-2024-40745

December 5, 2024

Vulnerability Summary: CVE-2024-40745 Reflected Cross site scripting vulnerability in Convert Forms component for Joomla in versions before 4.4.8. Affected Endpoints:...

Read MoreRead more about CVE Alert: CVE-2024-40745
image
  • Data Breach
  • Ransomware

[CLOAK] – Ransomware Victim: Donnewalddistributing

December 5, 2024

Ransomware Group: CLOAK VICTIM NAME: Donnewalddistributing NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [CLOAK] – Ransomware Victim: Donnewalddistributing
image
  • Vulnerabilities

CVE Alert: CVE-2024-53614

December 5, 2024

Vulnerability Summary: CVE-2024-53614 A hardcoded decryption key in Thinkware Cloud APK v4.3.46 allows attackers to access sensitive data and execute...

Read MoreRead more about CVE Alert: CVE-2024-53614
image
  • Vulnerabilities

CVE Alert: CVE-2024-54002

December 5, 2024

Vulnerability Summary: CVE-2024-54002 Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software...

Read MoreRead more about CVE Alert: CVE-2024-54002
image
  • Vulnerabilities

CVE Alert: CVE-2024-20397

December 5, 2024

Vulnerability Summary: CVE-2024-20397 A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access...

Read MoreRead more about CVE Alert: CVE-2024-20397
image
  • Vulnerabilities

CVE Alert: CVE-2024-12147

December 5, 2024

Vulnerability Summary: CVE-2024-12147 A vulnerability was found in Netgear R6900 1.0.1.26_1.0.20. It has been declared as critical. Affected by this...

Read MoreRead more about CVE Alert: CVE-2024-12147
image
  • Vulnerabilities

CVE Alert: CVE-2024-12196

December 5, 2024

Vulnerability Summary: CVE-2024-12196 Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to...

Read MoreRead more about CVE Alert: CVE-2024-12196
image
  • Vulnerabilities

CVE Alert: CVE-2024-38829

December 5, 2024

Vulnerability Summary: CVE-2024-38829 A vulnerability in VMware Tanzu Spring LDAP allows data exposure for case sensitive comparisons.This issue affects Spring...

Read MoreRead more about CVE Alert: CVE-2024-38829
image
  • Vulnerabilities

CVE Alert: CVE-2024-12181

December 5, 2024

Vulnerability Summary: CVE-2024-12181 A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown...

Read MoreRead more about CVE Alert: CVE-2024-12181
image
  • Vulnerabilities

CVE Alert: CVE-2024-12183

December 5, 2024

Vulnerability Summary: CVE-2024-12183 A vulnerability, which was classified as problematic, was found in DedeCMS 5.7.116. This affects the function RemoveXSS...

Read MoreRead more about CVE Alert: CVE-2024-12183
image
  • Vulnerabilities

CVE Alert: CVE-2024-12182

December 5, 2024

Vulnerability Summary: CVE-2024-12182 A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7.116. Affected by this issue...

Read MoreRead more about CVE Alert: CVE-2024-12182
image
  • Vulnerabilities

CVE Alert: CVE-2024-12180

December 5, 2024

Vulnerability Summary: CVE-2024-12180 A vulnerability classified as problematic has been found in DedeCMS 5.7.116. Affected is an unknown function of...

Read MoreRead more about CVE Alert: CVE-2024-12180
news
  • News
  • Premium Members Content

German Police Shut Down Largest Illegal Dark Web Marketplace

December 5, 2024

German police have made a significant move by shutting down the largest illegal dark web marketplace in the country, known...

Read MoreRead more about German Police Shut Down Largest Illegal Dark Web Marketplace
news
  • News
  • Premium Members Content

Stoli Files for Bankruptcy: Impacts of Ransomware Attack on Vodka Industry

December 5, 2024

Stoli, a prominent vodka manufacturer, has filed for bankruptcy in the US following a severe ransomware attack that crippled its...

Read MoreRead more about Stoli Files for Bankruptcy: Impacts of Ransomware Attack on Vodka Industry
news
  • News
  • Premium Members Content

ENISA Reveals Alarming State of EU Cybersecurity in New Report

December 5, 2024

European institutions face significant cyber threats, warns the first State of Cybersecurity report by the EU’s Cybersecurity Agency (ENISA). European...

Read MoreRead more about ENISA Reveals Alarming State of EU Cybersecurity in New Report
news
  • News
  • Premium Members Content

Open Source Security Risks: Key Insights from Recent CENSUS III Report

December 5, 2024

Open source security risks pose significant challenges, as highlighted by the recent CENSUS III report by the Linux Foundation and...

Read MoreRead more about Open Source Security Risks: Key Insights from Recent CENSUS III Report
news
  • News
  • Premium Members Content

Cyber-Attack Affects Liverpool Children’s Hospital and Other NHS Facilities

December 5, 2024

A recent cyber-attack has inadvertently impacted three significant healthcare organizations near Liverpool, including the Alder Hey Children’s Hospital. A single...

Read MoreRead more about Cyber-Attack Affects Liverpool Children’s Hospital and Other NHS Facilities
news
  • News
  • Premium Members Content

Wirral Hospital Recovery: Update on Cybersecurity Incident

December 5, 2024

The Wirral University Teaching Hospital (WUTH) is making significant progress in recovery following a recent cybersecurity incident that disrupted patient...

Read MoreRead more about Wirral Hospital Recovery: Update on Cybersecurity Incident
news
  • News
  • Premium Members Content

Ransomware Downtime Costs Manufacturing Sector $17 Billion

December 5, 2024

Ransomware has severely impacted the manufacturing sector, causing an astonishing $17 billion in downtime since 2018. This alarming trend emphasizes...

Read MoreRead more about Ransomware Downtime Costs Manufacturing Sector $17 Billion
news
  • News
  • Premium Members Content

FTC Protects Americans from Misuse of Sensitive Location Data

December 5, 2024

The FTC has taken significant action to limit data brokers from misusing sensitive location data, enhancing consumer privacy safeguards. The...

Read MoreRead more about FTC Protects Americans from Misuse of Sensitive Location Data
image
  • Data Breach
  • Ransomware

[LOCKBIT3] – Ransomware Victim: copral[.]com[.]br

December 5, 2024

Ransomware Group: LOCKBIT3 VICTIM NAME: copralcombr NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [LOCKBIT3] – Ransomware Victim: copral[.]com[.]br
image
  • Data Breach
  • Ransomware

[APT73] – Ransomware Victim: www[.]certifiedinfosec[.]com

December 5, 2024

Ransomware Group: APT73 VICTIM NAME: wwwcertifiedinfoseccom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [APT73] – Ransomware Victim: www[.]certifiedinfosec[.]com
image
  • Data Breach
  • Ransomware

[BLACKBASTA] – Ransomware Victim: vossko[.]de

December 5, 2024

Ransomware Group: BLACKBASTA VICTIM NAME: vosskode NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [BLACKBASTA] – Ransomware Victim: vossko[.]de

Posts pagination

Previous 1 … 723 724 725 726 727 728 729 … 4,239 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hkcert
  • HKCERT
  • News

Ubuntu Linux Kernel Multiple Vulnerabilities

July 14, 2025
cybercrime
  • News

Amd Warns Of New Meltdown, Spectre Like Bugs Affecting Cpus

July 14, 2025
cybercrime
  • News

You Have A Fake North Korean It Worker Problem Here’s How To Stop It

July 14, 2025
cybercrime
  • News

Ai Coding Tools Make Developers Slower But They Think They’re Faster, Studyfinds

July 14, 2025
cybercrime
  • News

How To Trick Chatgpt Into Revealing Windows Keys? I Give Up

July 14, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel