Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025
unlock_membership
  • Premium Members Content

Mastering Secure Coding Practices to Protect Your Software

June 27, 2025

Editor’s Picks

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Sophos Connect information disclosure | CVE-2022-48310

March 3, 2023

NAME__________Sophos Connect information disclosurePlatforms Affected:Risk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Sophos Connect could allow a local authenticated attacker to obtain sensitive information. An...

Read MoreRead more about Sophos Connect information disclosure | CVE-2022-48310
CVE-prog
  • Vulnerabilities

Gradle code execution | CVE-2023-26053

March 3, 2023

NAME__________Gradle code executionPlatforms Affected:Gradle Gradle 6.2 Gradle Gradle 7.6Risk Level:6.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Gradle could allow a remote authenticated attacker to execute...

Read MoreRead more about Gradle code execution | CVE-2023-26053
CVE-prog
  • Vulnerabilities

GitLab Community and Enterprise Edition security bypass | CVE-2022-4331

March 3, 2023

NAME__________GitLab Community and Enterprise Edition security bypassPlatforms Affected:GitLab Enterprise Edition (EE) 15.8.0 GitLab Community Edition (CE) 15.8.0 GitLab Community Edition...

Read MoreRead more about GitLab Community and Enterprise Edition security bypass | CVE-2022-4331
CVE-prog
  • Vulnerabilities

GitLab Community and Enterprise Edition denial of service | CVE-2023-1072

March 3, 2023

NAME__________GitLab Community and Enterprise Edition denial of servicePlatforms Affected:GitLab Enterprise Edition (EE) 15.8.0 GitLab Community Edition (CE) 15.8.0 GitLab Community...

Read MoreRead more about GitLab Community and Enterprise Edition denial of service | CVE-2023-1072
CVE-prog
  • Vulnerabilities

Linux Kernel denial of service | CVE-2023-1118

March 3, 2023

NAME__________Linux Kernel denial of servicePlatforms Affected:Linux KernelRisk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Linux Kernel is vulnerable to a denial of service, caused...

Read MoreRead more about Linux Kernel denial of service | CVE-2023-1118
CVE-prog
  • Vulnerabilities

Yordam Library Automation System cross-site scripting | CVE-2021-45478

March 3, 2023

NAME__________Yordam Library Automation System cross-site scriptingPlatforms Affected:Risk Level:6.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Yordam Library Automation System is vulnerable to cross-site scripting, caused by...

Read MoreRead more about Yordam Library Automation System cross-site scripting | CVE-2021-45478
CVE-prog
  • Vulnerabilities

e-Belediye denial of service | CVE-2023-1114

March 3, 2023

NAME__________e-Belediye denial of servicePlatforms Affected:e-Belediye e-BelediyeRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________e-Belediye is vulnerable to a denial of service, caused by the...

Read MoreRead more about e-Belediye denial of service | CVE-2023-1114
CVE-prog
  • Vulnerabilities

Dell EMC NetWorker information disclosure | CVE-2023-24567

March 3, 2023

NAME__________Dell EMC NetWorker information disclosurePlatforms Affected:Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Dell EMC NetWorker could allow a remote attacker to obtain sensitive information....

Read MoreRead more about Dell EMC NetWorker information disclosure | CVE-2023-24567
CVE-prog
  • Vulnerabilities

IBM Spectrum Symphony HOST header injection | CVE-2023-24975

March 3, 2023

NAME__________IBM Spectrum Symphony HOST header injectionPlatforms Affected:IBM Spectrum Symphony 7.3Risk Level:5.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________IBM Spectrum Symphony 7.3 is vulnerable to HTTP...

Read MoreRead more about IBM Spectrum Symphony HOST header injection | CVE-2023-24975
doc-1
  • News

Hackers Exploit Containerized Environments to Steal Proprietary Data and Software

March 3, 2023

A sophisticated attack campaign dubbed SCARLETEEL is targeting containerized environments to perpetrate theft of proprietary data and software. "The attacker...

Read MoreRead more about Hackers Exploit Containerized Environments to Steal Proprietary Data and Software
royal-ransomware
  • News

U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities

March 3, 2023

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which emerged in the...

Read MoreRead more about U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities
trend-2
  • Vulnerabilities

Daily Vulnerability Trends: Fri Mar 03 2023

March 3, 2023

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2023-0669Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability...

Read MoreRead more about Daily Vulnerability Trends: Fri Mar 03 2023
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 7e81c990211ee023d354c438b620532d

March 3, 2023

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 7e81c990211ee023d354c438b620532dSHA1: b33e485bea1f17d4d2db7377cc5611173a189c80ANALYSIS DATE: 2023-03-03T03:06:03ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 7e81c990211ee023d354c438b620532d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – ae1a6c46eb913913ce9657d95e08d18d

March 3, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:smokeloader, family:vidar, backdoor, discovery, persistence, ransomware, stealer, trojanMD5: ae1a6c46eb913913ce9657d95e08d18dSHA1: 0ce678227bf82b32743c44007721001b1e6fea1fANALYSIS DATE: 2023-03-03T03:38:46ZTTPS: T1060, T1112, T1012,...

Read MoreRead more about Malware Analysis – djvu – ae1a6c46eb913913ce9657d95e08d18d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – d036bdfd321f1f42933e7cc2ca675f29

March 3, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: d036bdfd321f1f42933e7cc2ca675f29SHA1: 293f17bbcf5e4db3d88206e10f4b5f6b71adf2b7ANALYSIS DATE: 2023-03-03T05:38:52ZTTPS: T1012, T1060, T1112, T1222, T1082,...

Read MoreRead more about Malware Analysis – djvu – d036bdfd321f1f42933e7cc2ca675f29
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – e0c80632086c1a07a788eca51a0a1440

March 3, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: e0c80632086c1a07a788eca51a0a1440SHA1: 71a471bac756a7c8f610e8064917f3e2de3c7882ANALYSIS DATE: 2023-03-03T04:33:02ZTTPS: T1082, T1222, T1012, T1060, T1112,...

Read MoreRead more about Malware Analysis – djvu – e0c80632086c1a07a788eca51a0a1440
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – b8c11d1e438c7abf33904db470deab58

March 3, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:smokeloader, family:vidar, backdoor, discovery, persistence, ransomware, spyware, stealer, trojanMD5: b8c11d1e438c7abf33904db470deab58SHA1: af8ab902c26d27a6602c491848135fd852517b9eANALYSIS DATE: 2023-03-03T05:32:24ZTTPS: T1012, T1120,...

Read MoreRead more about Malware Analysis – djvu – b8c11d1e438c7abf33904db470deab58
HIBP-Banner-1
  • Data Breach

GunAuction – 565,470 breached accounts

March 3, 2023

HIBP In December 2022, the online firearms auction website GunAuction.com suffered a data breach which was later discovered left unprotected...

Read MoreRead more about GunAuction – 565,470 breached accounts
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – e4e1d4d2eda54d7f87018e5cda0b08e6

March 3, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, family:vidar, backdoor, discovery, persistence, ransomware, stealer, trojanMD5: e4e1d4d2eda54d7f87018e5cda0b08e6SHA1: fde42981ac47ce2623d5dfa9fd2496e9feef5d38ANALYSIS DATE: 2023-03-02T21:34:50ZTTPS: T1012, T1120,...

Read MoreRead more about Malware Analysis – amadey – e4e1d4d2eda54d7f87018e5cda0b08e6
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 2e0b52e14e9d0e424a02c7e2b84befce

March 3, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, family:vidar, backdoor, discovery, infostealer, persistence, ransomware, stealer, trojanMD5: 2e0b52e14e9d0e424a02c7e2b84befceSHA1: eef5de144176ec6395884ecd2c7cac0443269964ANALYSIS DATE: 2023-03-02T21:01:59ZTTPS: T1053,...

Read MoreRead more about Malware Analysis – djvu – 2e0b52e14e9d0e424a02c7e2b84befce
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 04edfb7f28e85eb9bdefd63e81c37753

March 3, 2023

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: 04edfb7f28e85eb9bdefd63e81c37753SHA1: 9ea3665e662fd22ccb6d8d977ad5abd6bc806631ANALYSIS DATE: 2023-03-02T23:35:05ZTTPS: T1107, T1490, T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – ransomware – 04edfb7f28e85eb9bdefd63e81c37753
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 36cb7a71342ea66c57aa3a6765183f8a

March 3, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:redline, family:rhadamanthys, family:smokeloader, family:vidar, backdoor, discovery, infostealer, persistence, ransomware, stealer, trojanMD5: 36cb7a71342ea66c57aa3a6765183f8aSHA1: 15b08ba7d0fec5e46d474a77c9f2ca151f6fdf05ANALYSIS DATE:...

Read MoreRead more about Malware Analysis – amadey – 36cb7a71342ea66c57aa3a6765183f8a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – e03f2b379b9364fbdfa47188787fae72

March 3, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: e03f2b379b9364fbdfa47188787fae72SHA1: 2eef20803b148773d5ac61c5d8acc6e100642e55ANALYSIS DATE: 2023-03-02T23:41:01ZTTPS: T1222, T1060, T1112, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – e03f2b379b9364fbdfa47188787fae72
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 47fbfbeb34089da50cd0d210833d7b1d

March 3, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: 47fbfbeb34089da50cd0d210833d7b1dSHA1: 7f52d1ae8b26b382bf48ecff786381330dcf5bf8ANALYSIS DATE: 2023-03-02T23:23:50ZTTPS: T1222, T1053, T1082, T1012, T1005,...

Read MoreRead more about Malware Analysis – djvu – 47fbfbeb34089da50cd0d210833d7b1d

Posts pagination

Previous 1 … 2,512 2,513 2,514 2,515 2,516 2,517 2,518 … 4,202 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-27026

July 3, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-52891

July 3, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53492

July 3, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46647

July 3, 2025
image
  • News

CVE Alert: CVE-2025-45029

July 3, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel