Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

  • Home
  • Merch
  • Premium Members Content
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
  • Vulnerabilities
    • Bug Bounty
  • Tools
  • News

How Water Labbu Exploits Electron-Based Applications

4 months ago1 mins
In the second part of our Water Labbu blog series, we explore how the threat actor exploits Electron-based applications using Cobalt Strike to deploy backdoors.

If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.

Discord

Original Source
Tagged: OSINT Security threatintel

Post navigation

Previous: US-CERT Bulletin (SB22-276):Vulnerability Summary for the Week of September 26, 2022
Next: Malware Analysis – djvu – a485514c993967e9b55c4dcff24e9eea

Related News

b1089ec1f0dd9f9546144700b9c14edca42098d7321307e53b3df5c90a4d4feb

Ransomware in December 2022

admin22 mins ago 0
CISA Logo

US-CERT Bulletin (SB23-030):Vulnerability Summary for the Week of January 23, 2023

admin2 days ago 0
cyber security 1805632 1280

Winnti APT group docks in Sri Lanka for new campaign

admin3 days ago 0

Search

Buy Me A Coffee

Support The Site

Official Merch Store

Click to visit the store.

Tags

#threatintel #security #osint ALPHV Black Basta BlackCat bug bounty BugCrowd Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM conti Cross-Site Scripting CVE CVE-2020-27216 cyber cybersecurity dark web data breach Denial of Service exploit full disclosure Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP Lockbit 2.0 lockbit 3.0 Mailing List malware MISC OSINT patch ransomware seclist Security Third Party Advisory threatintel tools tor TroyHunt Vendor Advisory vulnerabilities vulnerability vulns

Telegram Chat

Telegram Chat