Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025
unlock_membership
  • Premium Members Content

Mastering Secure Coding Practices to Protect Your Software

June 27, 2025
unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for Robust Cyber Defense

June 25, 2025
unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 117[.]72[.]83[.]32:80

October 10, 2024

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 117[.]72[.]83[.]32:80
image
  • Data Breach
  • Ransomware

[HUNTERS] – Ransomware Victim: Glacier

October 10, 2024

Ransomware Group: HUNTERS VICTIM NAME: Glacier NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [HUNTERS] – Ransomware Victim: Glacier
image
  • Data Breach
  • Ransomware

[MEOW] – Ransomware Victim: Atlantic Coast Consulting Inc

October 10, 2024

Ransomware Group: MEOW VICTIM NAME: Atlantic Coast Consulting Inc NOTE: No files or stolen information are by RedPacket Security. Any...

Read MoreRead more about [MEOW] – Ransomware Victim: Atlantic Coast Consulting Inc
hkcert
  • HKCERT
  • News

Fortinet Products Multiple Vulnerabilities

October 10, 2024

Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...

Read MoreRead more about Fortinet Products Multiple Vulnerabilities
hkcert
  • HKCERT
  • News

Mozilla Firefox Remote Code Execution Vulnerability

October 10, 2024

A vulnerability was identified in Mozilla Firefox. A remote attacker could exploit this vulnerability to trigger remote code execution on...

Read MoreRead more about Mozilla Firefox Remote Code Execution Vulnerability
image
  • Vulnerabilities

CVE Alert: CVE-2024-46292

October 10, 2024

Vulnerability Summary: CVE-2024-46292 A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a...

Read MoreRead more about CVE Alert: CVE-2024-46292
image
  • Vulnerabilities

CVE Alert: CVE-2024-43610

October 10, 2024

Vulnerability Summary: CVE-2024-43610 Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view...

Read MoreRead more about CVE Alert: CVE-2024-43610
image
  • Vulnerabilities

CVE Alert: CVE-2024-47813

October 10, 2024

Vulnerability Summary: CVE-2024-47813 Wasmtime is an open source runtime for WebAssembly. Under certain concurrent event orderings, a `wasmtime::Engine`'s internal type...

Read MoreRead more about CVE Alert: CVE-2024-47813
image
  • Vulnerabilities

CVE Alert: CVE-2024-47812

October 10, 2024

Vulnerability Summary: CVE-2024-47812 ImportDump is an extension for mediawiki designed to automate user import requests. Anyone who can edit the...

Read MoreRead more about CVE Alert: CVE-2024-47812
image
  • Vulnerabilities

CVE Alert: CVE-2024-47763

October 10, 2024

Vulnerability Summary: CVE-2024-47763 Wasmtime is an open source runtime for WebAssembly. Wasmtime's implementation of WebAssembly tail calls combined with stack...

Read MoreRead more about CVE Alert: CVE-2024-47763
image
  • Vulnerabilities

CVE Alert: CVE-2024-47816

October 10, 2024

Vulnerability Summary: CVE-2024-47816 ImportDump is a mediawiki extension designed to automate user import requests. A user's local actor ID is...

Read MoreRead more about CVE Alert: CVE-2024-47816
image
  • Vulnerabilities

CVE Alert: CVE-2024-7038

October 10, 2024

Vulnerability Summary: CVE-2024-7038 An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model...

Read MoreRead more about CVE Alert: CVE-2024-7038
image
  • Vulnerabilities

CVE Alert: CVE-2024-3656

October 10, 2024

Vulnerability Summary: CVE-2024-3656 A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to...

Read MoreRead more about CVE Alert: CVE-2024-3656
image
  • Vulnerabilities

CVE Alert: CVE-2024-47815

October 10, 2024

Vulnerability Summary: CVE-2024-47815 IncidentReporting is a MediaWiki extension for moving incident reports from wikitext to database tables. There are a...

Read MoreRead more about CVE Alert: CVE-2024-47815
image
  • Vulnerabilities

CVE Alert: CVE-2024-47828

October 10, 2024

Vulnerability Summary: CVE-2024-47828 ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed...

Read MoreRead more about CVE Alert: CVE-2024-47828
image
  • Data Breach
  • Ransomware

[UNDERGROUND] – Ransomware Victim: Casio Computer Co[.], Ltd

October 10, 2024

Ransomware Group: UNDERGROUND VICTIM NAME: Casio Computer Co, Ltd NOTE: No files or stolen information are by RedPacket Security. Any...

Read MoreRead more about [UNDERGROUND] – Ransomware Victim: Casio Computer Co[.], Ltd
image
  • Data Breach
  • Ransomware

[HANDALA] – Ransomware Victim: Doscast

October 10, 2024

Ransomware Group: HANDALA VICTIM NAME: Doscast NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...

Read MoreRead more about [HANDALA] – Ransomware Victim: Doscast
hkcert
  • HKCERT
  • News

Mozilla Products Multiple Vulnerabilities

October 10, 2024

Multiple vulnerabilities were identified in Mozilla Products. A remote attacker could exploit these vulnerabilities to trigger denial of service condition...

Read MoreRead more about Mozilla Products Multiple Vulnerabilities
image
  • Vulnerabilities

CVE Alert: CVE-2024-30118

October 10, 2024

Vulnerability Summary: CVE-2024-30118 HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive...

Read MoreRead more about CVE Alert: CVE-2024-30118
image
  • Vulnerabilities

CVE Alert: CVE-2024-39515

October 10, 2024

Vulnerability Summary: CVE-2024-39515 An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks...

Read MoreRead more about CVE Alert: CVE-2024-39515
image
  • Vulnerabilities

CVE Alert: CVE-2024-38815

October 10, 2024

Vulnerability Summary: CVE-2024-38815 VMware NSX contains a content spoofing vulnerability. An unauthenticated malicious actor may be able to craft a...

Read MoreRead more about CVE Alert: CVE-2024-38815
image
  • Vulnerabilities

CVE Alert: CVE-2024-39525

October 10, 2024

Vulnerability Summary: CVE-2024-39525 An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos...

Read MoreRead more about CVE Alert: CVE-2024-39525
image
  • Vulnerabilities

CVE Alert: CVE-2024-39516

October 10, 2024

Vulnerability Summary: CVE-2024-39516 An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos...

Read MoreRead more about CVE Alert: CVE-2024-39516
image
  • Vulnerabilities

CVE Alert: CVE-2024-38817

October 10, 2024

Vulnerability Summary: CVE-2024-38817 Mware NSX contains a command injection vulnerability. A malicious actor with access to the NSX Edge CLI...

Read MoreRead more about CVE Alert: CVE-2024-38817

Posts pagination

Previous 1 … 891 892 893 894 895 896 897 … 4,193 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: www[.]nuphoton[.]com

July 1, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: semco-tech[.]com

July 1, 2025
image
  • Data Breach
  • Ransomware

[KAWA4096] – Ransomware Victim: **********-*******[.]co[.]jp

July 1, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: simmons-Boardman Publishing, Inc

July 1, 2025
image
  • Data Breach
  • Ransomware

[FLOCKER] – Ransomware Victim: I*******n[.]com

July 1, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel