Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025
unlock_membership
  • Premium Members Content

Fortifying the Supply Chain through Practical Security for Modern Organizations

September 22, 2025
unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
cybercrime
  • News

Linux Foundation Says Yes To Nosql Via Documentdb

August 27, 2025

The Linux Foundation on Monday welcomed Microsoft's DocumentDB into its stable of open source projects, waving the document database's permissive...

Read MoreRead more about Linux Foundation Says Yes To Nosql Via Documentdb
cybercrime
  • News

One Long Sentence Is All It Takes To Make Llms Misbehave

August 27, 2025

Security researchers from Palo Alto Networks' Unit 42 have discovered the key to getting large language model (LLM) chatbots to...

Read MoreRead more about One Long Sentence Is All It Takes To Make Llms Misbehave
cybercrime
  • News

Malware Ridden Apps Made It Into Google’s Play Store, Scored 19 Milliondownloads

August 27, 2025

Cloud security vendor Zscaler says customers of Google’s Play Store have downloaded more than 19 million instances of malware-laden apps...

Read MoreRead more about Malware Ridden Apps Made It Into Google’s Play Store, Scored 19 Milliondownloads
cybercrime
  • News

Aws, Cloudflare, Digital Ocean, And Google Helped Feds Investigate Allegedrapper Bot Ddos Perp

August 27, 2025

Infosec in brief PLUSThe US Department of Justice has thanked Akamai, Amazon Web Services, Cloudflare, Digital Ocean, Flashpoint, Google, PayPal,...

Read MoreRead more about Aws, Cloudflare, Digital Ocean, And Google Helped Feds Investigate Allegedrapper Bot Ddos Perp
cybercrime
  • News

Australian University Used Wi Fi Location Data To Identify Student Protestors

August 27, 2025

Asia In Brief Australia’s University of Melbourne last year used Wi-Fi location data to identify student protestors.The University used Wi-Fi...

Read MoreRead more about Australian University Used Wi Fi Location Data To Identify Student Protestors
cybercrime
  • News

Mysterious X 37b Spaceplane Flies Again, This Time Carrying A Quantum Gpsalternative

August 27, 2025

The US military’s Boeing-built X-37B spaceplane is in space again for its eighth mission.The X-37B is an uncrewed craft that,...

Read MoreRead more about Mysterious X 37b Spaceplane Flies Again, This Time Carrying A Quantum Gpsalternative
cybercrime
  • News

Cio Made A Dangerous Mistake And Ordered His Security Team To Implement It

August 27, 2025

Who, Me? Welcome to another instalment of Who, Me? It's The Register's reader-contributed column that shares your missives about massive...

Read MoreRead more about Cio Made A Dangerous Mistake And Ordered His Security Team To Implement It
cybercrime
  • News

The Air Is Hissing Out Of The Overinflated Ai Balloon

August 27, 2025

Opinion There tend to be three AI camps. 1) AI is the greatest thing since sliced bread and will transform...

Read MoreRead more about The Air Is Hissing Out Of The Overinflated Ai Balloon
cybercrime
  • News

Farmers Insurance Harvests Bad News: 1.1m Customers Snared In Data Breach

August 27, 2025

US insurance giant Farmers Insurance says more than a million customers had personal data nicked after a third-party vendor was...

Read MoreRead more about Farmers Insurance Harvests Bad News: 1.1m Customers Snared In Data Breach
cybercrime
  • News

Zipline Attack Uses ‘contact Us’ Forms, White House Butler Pic To Invadesensitive Industries

August 27, 2025

Cybercriminals are targeting critical US manufacturers and supply-chain companies, looking to steal sensitive IP and other data while deploying ransomware....

Read MoreRead more about Zipline Attack Uses ‘contact Us’ Forms, White House Butler Pic To Invadesensitive Industries
cybercrime
  • News

First Ai Powered Ransomware Spotted, But It’s Not Active – Yet

August 27, 2025

ESET malware researchers Anton Cherepanov and Peter Strycek have discovered what they describe as the "first known AI-powered ransomware," which...

Read MoreRead more about First Ai Powered Ransomware Spotted, But It’s Not Active – Yet
cybercrime
  • News

Citrix Patches Trio Of Netscaler Bugs – After Attackers Beat Them To It

August 27, 2025

Citrix has pushed out fixes for three fresh NetScaler holes – and yes, they've already been used in the wild...

Read MoreRead more about Citrix Patches Trio Of Netscaler Bugs – After Attackers Beat Them To It
cybercrime
  • News

Crypto Thief Earns Additional Prison Time For Assaulting Witness

August 27, 2025

A violent home invader and gunpoint cryptocurrency thief will now spend more than 50 years behind bars after being found...

Read MoreRead more about Crypto Thief Earns Additional Prison Time For Assaulting Witness
image
  • Vulnerabilities

CVE Alert: CVE-2025-9502 – Campcodes – Online Loan Management System

August 27, 2025

CVE-2025-9502 HIGHNo exploitation known A weakness has been identified in Campcodes Online Loan Management System 1.0. This impacts an unknown...

Read MoreRead more about CVE Alert: CVE-2025-9502 – Campcodes – Online Loan Management System
image
  • Vulnerabilities

CVE Alert: CVE-2025-9503 – Campcodes – Online Loan Management System

August 27, 2025

CVE-2025-9503 HIGHNo exploitation known A security vulnerability has been detected in Campcodes Online Loan Management System 1.0. Affected is an...

Read MoreRead more about CVE Alert: CVE-2025-9503 – Campcodes – Online Loan Management System
unlock_membership
  • Premium Members Content

Endpoint Protection Reimagined for Modern Enterprises

August 27, 2025

Endpoints are the frontline of modern cyber threats. Every laptop, desktop, mobile device, or IoT gateway can become a doorway...

Read MoreRead more about Endpoint Protection Reimagined for Modern Enterprises
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]35[.]109[.]246:443

August 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 101[.]35[.]109[.]246:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]110[.]32[.]120:8880

August 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 47[.]110[.]32[.]120:8880
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 117[.]72[.]96[.]48:443

August 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 117[.]72[.]96[.]48:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 74[.]48[.]223[.]225:51235

August 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 74[.]48[.]223[.]225:51235
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]92[.]76[.]13:80

August 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 47[.]92[.]76[.]13:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]113[.]217[.]92:8001

August 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 47[.]113[.]217[.]92:8001
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]41[.]91[.]64:443

August 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 121[.]41[.]91[.]64:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 112[.]125[.]88[.]176:443

August 27, 2025

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Strike Beacon Detected – 112[.]125[.]88[.]176:443

Posts pagination

Previous 1 … 88 89 90 91 92 93 94 … 4,472 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Applied Technology Resources

October 22, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Northern Light Technologies

October 22, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-41722 – Sauter – modulo 6 devices modu680-AS

October 22, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-41724 – Sauter – modulo 6 devices modu680-AS

October 22, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-41719 – Sauter – modulo 6 devices modu680-AS

October 22, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel