Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
00f8_Shutterstock_2257935625-1
  • Premium Members Content

Daily Threat Intelligence – May 16 – 2023

May 16, 2023

A Go implementation of Cobalt Strike called Geacon is being used by cybercriminals in attacks against macOS devices. Cyber experts...

Read MoreRead more about Daily Threat Intelligence – May 16 – 2023
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 5a8e2f2bdcc6be8d189e1badb8717ca0

May 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:9dfa7ee730fa2f1efb5ed51dbbec22f5, discovery, persistence, ransomware, spyware, stealerMD5: 5a8e2f2bdcc6be8d189e1badb8717ca0SHA1: 08d6fbe62d6bfbff71e9cb54d04bd995de47ea0dANALYSIS DATE: 2023-05-16T15:46:00ZTTPS: T1060, T1112, T1082, T1005,...

Read MoreRead more about Malware Analysis – djvu – 5a8e2f2bdcc6be8d189e1badb8717ca0
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 669a891fe610e110917fad79b6876f55

May 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:9dfa7ee730fa2f1efb5ed51dbbec22f5, discovery, persistence, ransomware, spyware, stealerMD5: 669a891fe610e110917fad79b6876f55SHA1: a762faa446f6a8da5770ecca619fc2cffdf33ab1ANALYSIS DATE: 2023-05-16T15:47:04ZTTPS: T1060, T1112, T1053, T1005,...

Read MoreRead more about Malware Analysis – djvu – 669a891fe610e110917fad79b6876f55
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – dc8396334e68e4ad4a8de1ae8dd3fbe8

May 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:9dfa7ee730fa2f1efb5ed51dbbec22f5, discovery, persistence, ransomware, spyware, stealerMD5: dc8396334e68e4ad4a8de1ae8dd3fbe8SHA1: 599785fc24bf60cc66234af1302e2afbdf7768c6ANALYSIS DATE: 2023-05-16T16:30:39ZTTPS: T1012, T1082, T1053, T1005,...

Read MoreRead more about Malware Analysis – djvu – dc8396334e68e4ad4a8de1ae8dd3fbe8
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – 87208f8f5babd537eb42ced3831018bd

May 16, 2023

Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, evasion, ransomware, trojanMD5: 87208f8f5babd537eb42ced3831018bdSHA1: 1bf91f8c00d9af85bce514f0c70d99ebff800e68ANALYSIS DATE: 2023-05-16T16:39:21ZTTPS: T1012, T1120, T1082, T1222, T1130, T1112 ScoreMeaningExample10Known badA...

Read MoreRead more about Malware Analysis – discovery – 87208f8f5babd537eb42ced3831018bd
CISA_Logo
  • CISA

CISA: CISA Releases Three Industrial Control Systems Advisories

May 16, 2023

CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on May 16, 2023. These...

Read MoreRead more about CISA: CISA Releases Three Industrial Control Systems Advisories
play_news_ransomware
  • Data Breach
  • Ransomware

Play Ransomware Victim: SOWITEC

May 16, 2023

Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about Play Ransomware Victim: SOWITEC
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: redos-in-time-rfc2822byooooooo_q

May 16, 2023

Programme HackerOne Ruby Ruby Submitted by ooooooo_q ooooooo_q Report ReDoS in Time.rfc2822 Full Report   A considerable amount of time...

Read MoreRead more about HackerOne Bug Bounty Disclosure: redos-in-time-rfc2822byooooooo_q
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: no-rate-limit-while-adding-additional-emails-featurebycryptographer

May 16, 2023

Programme HackerOne Nextcloud Nextcloud Submitted by cryptographer cryptographer Report No rate limit while adding Additional emails feature Full Report  ...

Read MoreRead more about HackerOne Bug Bounty Disclosure: no-rate-limit-while-adding-additional-emails-featurebycryptographer
ransomware-money
  • News

Inside Qilin Ransomware: Affiliates Take Home 85% of Ransom Payouts

May 16, 2023

Ransomware affiliates associated with the Qilin ransomware-as-a-service (RaaS) scheme earn anywhere between 80% to 85% of each ransom payment, according...

Read MoreRead more about Inside Qilin Ransomware: Affiliates Take Home 85% of Ransom Payouts
ba28b823a73639ffaad4bdb3da691aaa1b72a7c0e6f4ddcf1a1ddb95be93cc35
  • News

China’s Mustang Panda Hackers Exploit TP-Link Routers for Persistent Attacks

May 16, 2023

The Chinese nation-state actor known as Mustang Panda has been linked to a new set of sophisticated and targeted attacks...

Read MoreRead more about China’s Mustang Panda Hackers Exploit TP-Link Routers for Persistent Attacks
123123123123123123123123
  • Data Breach
  • Ransomware

Medusa Locker Ransomware Victim: BAMSI

May 16, 2023

  Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...

Read MoreRead more about Medusa Locker Ransomware Victim: BAMSI
d9770bda5a03d0c2cfad0a168815b02c66c244bfc65da01f0ee0aadbeae730ba
  • News

Hackers Using Golang Variant of Cobalt Strike to Target Apple macOS Systems

May 16, 2023

A Golang implementation of Cobalt Strike called Geacon is likely to garner the attention of threat actors looking to target...

Read MoreRead more about Hackers Using Golang Variant of Cobalt Strike to Target Apple macOS Systems
e9d311cf12edbd225966dc986962d999b22765a54bec0c9ea5d979bab15c876f
  • News

CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules

May 16, 2023

The threat actors behind the CopperStealer malware resurfaced with two new campaigns in March and April 2023 that are designed...

Read MoreRead more about CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules
cyolo
  • News

Cyolo Product Overview: Secure Remote Access to All Environments

May 16, 2023

Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations' essential systems and resources. Cybercriminals no longer...

Read MoreRead more about Cyolo Product Overview: Secure Remote Access to All Environments
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: airtac[.]com

May 16, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: airtac[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: chinadailyhk[.]com

May 16, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: chinadailyhk[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: norcorp[.]com

May 16, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: norcorp[.]com
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 101[.]43[.]165[.]220:8080

May 16, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 101[.]43[.]165[.]220:8080
image-1
  • Data Breach
  • Ransomware

Abyss Ransomware Victim: www[.]l3harris[.]com

May 16, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Abyss Ransomware Victim: www[.]l3harris[.]com
image-1
  • Data Breach
  • Ransomware

Abyss Ransomware Victim: stonehillcontracting[.]com

May 16, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Abyss Ransomware Victim: stonehillcontracting[.]com
image-1
  • Data Breach
  • Ransomware

Abyss Ransomware Victim: brett-robinson[.]com

May 16, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Abyss Ransomware Victim: brett-robinson[.]com
image-1
  • Data Breach
  • Ransomware

Abyss Ransomware Victim: 7x7oralsurgery[.]com

May 16, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Abyss Ransomware Victim: 7x7oralsurgery[.]com
image-1
  • Data Breach
  • Ransomware

Abyss Ransomware Victim: avidxchange[.]com

May 16, 2023

NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...

Read MoreRead more about Abyss Ransomware Victim: avidxchange[.]com

Posts pagination

Previous 1 … 2,449 2,450 2,451 2,452 2,453 2,454 2,455 … 4,407 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-8696 – ISC – Stork

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7718 – pixel_prime – Resideo Plugin for Resideo – Real Estate WordPress Theme

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7049 – dasinfomedia – WPGYM – WordPress Gym Management System

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10049 – nik00726 – Responsive Filterable Portfolio

September 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-41714 – Welotec – SmartEMS Web Application

September 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel