Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials: A Practical Roadmap for Modern Infrastructures

August 11, 2025
unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
image
  • Data Breach
  • Ransomware

[GLOBAL] – Ransomware Victim: MukundRhotindian

July 26, 2025

Ransomware Group: GLOBAL VICTIM NAME: MukundRhotindian NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [GLOBAL] – Ransomware Victim: MukundRhotindian
image
  • Data Breach
  • Ransomware

[GLOBAL] – Ransomware Victim: Medical Village LIV

July 26, 2025

Ransomware Group: GLOBAL VICTIM NAME: Medical Village LIV NOTE: No files or stolen information are by RedPacket Security. Any legal...

Read MoreRead more about [GLOBAL] – Ransomware Victim: Medical Village LIV
image
  • Vulnerabilities

CVE Alert: CVE-2025-45960

July 26, 2025

Vulnerability Summary: CVE-2025-45960 Cross Site Scripting vulnerability in tawk.to Live Chat v.1.6.1 allows a remote attacker to execute arbitrary code...

Read MoreRead more about CVE Alert: CVE-2025-45960
image
  • Vulnerabilities

CVE Alert: CVE-2025-45893

July 26, 2025

Vulnerability Summary: CVE-2025-45893 OpenCart version 4.1.0.4 is vulnerable to a Stored Cross-Site Scripting (XSS) attack via SVG file uploads used...

Read MoreRead more about CVE Alert: CVE-2025-45893
image
  • Vulnerabilities

CVE Alert: CVE-2025-45892

July 26, 2025

Vulnerability Summary: CVE-2025-45892 OpenCart version 4.1.0.4 is vulnerable to a Stored Cross-Site Scripting (XSS) attack via the blog editor. The...

Read MoreRead more about CVE Alert: CVE-2025-45892
image
  • Vulnerabilities

CVE Alert: CVE-2025-8162

July 26, 2025

Vulnerability Summary: CVE-2025-8162 A vulnerability, which was classified as critical, has been found in deerwms deer-wms-2 up to 3.3. Affected...

Read MoreRead more about CVE Alert: CVE-2025-8162
image
  • Vulnerabilities

CVE Alert: CVE-2025-45406

July 26, 2025

Vulnerability Summary: CVE-2025-45406 A stored cross-site scripting (XSS) vulnerability in CodeIgniter4 v4.6.0 allows attackers to execute arbitrary web scripts or...

Read MoreRead more about CVE Alert: CVE-2025-45406
image
  • Vulnerabilities

CVE Alert: CVE-2025-8164

July 26, 2025

Vulnerability Summary: CVE-2025-8164 A vulnerability has been found in code-projects Public Chat Room 1.0 and classified as critical. This vulnerability...

Read MoreRead more about CVE Alert: CVE-2025-8164
image
  • Vulnerabilities

CVE Alert: CVE-2025-5449

July 26, 2025

Vulnerability Summary: CVE-2025-5449 A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due...

Read MoreRead more about CVE Alert: CVE-2025-5449
image
  • Vulnerabilities

CVE Alert: CVE-2025-8161

July 26, 2025

Vulnerability Summary: CVE-2025-8161 A vulnerability classified as critical was found in deerwms deer-wms-2 up to 3.3. Affected by this vulnerability...

Read MoreRead more about CVE Alert: CVE-2025-8161
image
  • Vulnerabilities

CVE Alert: CVE-2025-46199

July 26, 2025

Vulnerability Summary: CVE-2025-46199 Cross Site Scripting vulnerability in grav v.1.7.48 and before allows an attacker to execute arbitrary code via...

Read MoreRead more about CVE Alert: CVE-2025-46199
image
  • Vulnerabilities

CVE Alert: CVE-2025-8163

July 26, 2025

Vulnerability Summary: CVE-2025-8163 A vulnerability, which was classified as critical, was found in deerwms deer-wms-2 up to 3.3. This affects...

Read MoreRead more about CVE Alert: CVE-2025-8163
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Morrow Equipment

July 26, 2025

Ransomware Group: LYNX VICTIM NAME: Morrow Equipment NOTE: No files or stolen information are by RedPacket Security. Any legal issues...

Read MoreRead more about [LYNX] – Ransomware Victim: Morrow Equipment
image
  • Vulnerabilities

CVE Alert: CVE-2025-52447

July 26, 2025

Vulnerability Summary: CVE-2025-52447 Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (set-initial-sql tabdoc command modules)...

Read MoreRead more about CVE Alert: CVE-2025-52447
image
  • Vulnerabilities

CVE Alert: CVE-2025-52446

July 26, 2025

Vulnerability Summary: CVE-2025-52446 Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (tab-doc api modules) allows...

Read MoreRead more about CVE Alert: CVE-2025-52446
image
  • Vulnerabilities

CVE Alert: CVE-2025-52449

July 26, 2025

Vulnerability Summary: CVE-2025-52449 Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Extensible Protocol...

Read MoreRead more about CVE Alert: CVE-2025-52449
image
  • Vulnerabilities

CVE Alert: CVE-2025-52448

July 26, 2025

Vulnerability Summary: CVE-2025-52448 Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (validate-initial-sql api modules) allows...

Read MoreRead more about CVE Alert: CVE-2025-52448
image
  • Vulnerabilities

CVE Alert: CVE-2025-52452

July 26, 2025

Vulnerability Summary: CVE-2025-52452 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Salesforce Tableau Server on...

Read MoreRead more about CVE Alert: CVE-2025-52452
image
  • Vulnerabilities

CVE Alert: CVE-2025-8166

July 26, 2025

Vulnerability Summary: CVE-2025-8166 A vulnerability was found in code-projects Church Donation System 1.0. It has been classified as critical. Affected...

Read MoreRead more about CVE Alert: CVE-2025-8166
image
  • Vulnerabilities

CVE Alert: CVE-2025-8165

July 26, 2025

Vulnerability Summary: CVE-2025-8165 A vulnerability was found in code-projects Food Review System 1.0 and classified as critical. This issue affects...

Read MoreRead more about CVE Alert: CVE-2025-8165
image
  • Vulnerabilities

CVE Alert: CVE-2025-52453

July 26, 2025

Vulnerability Summary: CVE-2025-52453 Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (Flow Data Source modules) allows...

Read MoreRead more about CVE Alert: CVE-2025-52453
image
  • Vulnerabilities

CVE Alert: CVE-2025-52454

July 26, 2025

Vulnerability Summary: CVE-2025-52454 Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (Amazon S3 Connector modules) allows...

Read MoreRead more about CVE Alert: CVE-2025-52454
image
  • Vulnerabilities

CVE Alert: CVE-2025-52455

July 26, 2025

Vulnerability Summary: CVE-2025-52455 Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (EPS Server modules) allows Resource...

Read MoreRead more about CVE Alert: CVE-2025-52455
image
  • Data Breach
  • Ransomware

[ABYSS] – Ransomware Victim: hptc[.]org

July 26, 2025

Ransomware Group: ABYSS VICTIM NAME: hptcorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [ABYSS] – Ransomware Victim: hptc[.]org

Posts pagination

Previous 1 … 75 76 77 78 79 80 81 … 4,357 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[CRYPTO24] – Ransomware Victim: Palmgold Management Sdn Bhd

August 18, 2025
image
  • Data Breach
  • Ransomware

[ANUBIS] – Ransomware Victim: Advanced HPC

August 18, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Ahtna Incorporated

August 18, 2025
image
  • Data Breach
  • Ransomware

[SINOBI] – Ransomware Victim: Hygrade Components

August 18, 2025
image
  • Data Breach
  • Ransomware

[INTERLOCK] – Ransomware Victim: Box Elder County

August 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel