Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
ransomhouse-1
  • Data Breach
  • Ransomware

RansomHouse Ransomware Victim: OMT Officine Meccaniche Torino S[.]p[.]A[.]

April 27, 2023

  RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about RansomHouse Ransomware Victim: OMT Officine Meccaniche Torino S[.]p[.]A[.]
CISA_Logo
  • CISA

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

April 27, 2023

CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...

Read MoreRead more about CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA_Logo
  • CISA

CISA: CISA Releases Two Industrial Control Systems Advisories

April 27, 2023

CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on April 25, 2023. These...

Read MoreRead more about CISA: CISA Releases Two Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: VMware Releases Security Update for Aria Operations for Logs

April 27, 2023

VMware Releases Security Update for Aria Operations for Logs VMware has released a security update to address multiple vulnerabilities in...

Read MoreRead more about CISA: VMware Releases Security Update for Aria Operations for Logs
CISA_Logo
  • CISA

CISA: Abuse of the Service Location Protocol May Lead to DoS Attacks

April 27, 2023

Abuse of the Service Location Protocol May Lead to DoS Attacks The Service Location Protocol (SLP, RFC 2608(link is external))...

Read MoreRead more about CISA: Abuse of the Service Location Protocol May Lead to DoS Attacks
CISA_Logo
  • CISA

CISA: CISA Releases Two SBOM Documents

April 27, 2023

CISA Releases Two SBOM Documents Today, CISA released two community-drafted documents around Software Bill of Materials (SBOM): Types of SBOM...

Read MoreRead more about CISA: CISA Releases Two SBOM Documents
brute_ratel_c4
  • Brute Ratel C4

Brute Ratel C4 Detected – 2600:9000:201b:aa00:16:f834:8940:93a1:80

April 27, 2023

The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...

Read MoreRead more about Brute Ratel C4 Detected – 2600:9000:201b:aa00:16:f834:8940:93a1:80
CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of April 17, 2023

April 26, 2023

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...

Read MoreRead more about US-CERT Vulnerability Summary for the Week of April 17, 2023
8917a5ac90d3155577460b44bcabbf620cc34af1863ec8d0945deb5b52115601
  • Tools

PortEx – Java Library To Analyse Portable Executable Files With A Special Focus On Malware Analysis And PE Malformation Robustness

April 26, 2023

PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness,...

Read MoreRead more about PortEx – Java Library To Analyse Portable Executable Files With A Special Focus On Malware Analysis And PE Malformation Robustness
8b70_Shutterstock_2264612211
  • Premium Members Content

Daily Threat Intelligence – April 26 – 2023

April 26, 2023

Chinese cybercriminals were reported using new malware variants in their espionage attacks against South Africa and Nepal. The campaign includes...

Read MoreRead more about Daily Threat Intelligence – April 26 – 2023
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 2e2d214abd61d6b40e8ad5e9e437df45

April 26, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:lumma, family:smokeloader, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:pub1, botnet:sprg, backdoor, discovery, persistence, ransomware, spyware, stealer, trojanMD5: 2e2d214abd61d6b40e8ad5e9e437df45SHA1:...

Read MoreRead more about Malware Analysis – amadey – 2e2d214abd61d6b40e8ad5e9e437df45
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 51a4106e8f56ecb11ff22995f4cfd3e1

April 26, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, spyware, stealerMD5: 51a4106e8f56ecb11ff22995f4cfd3e1SHA1: 2781e07822cf8b54406d5785e0e71e3158f4666fANALYSIS DATE: 2023-04-26T15:49:43ZTTPS: T1012, T1082, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 51a4106e8f56ecb11ff22995f4cfd3e1
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – fd68d6d16b3b5a68311907694d3c5967

April 26, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:lumma, family:redline, family:smokeloader, family:vidar, botnet:1379752987, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:sprg, backdoor, discovery, evasion, infostealer, persistence, ransomware, spyware,...

Read MoreRead more about Malware Analysis – amadey – fd68d6d16b3b5a68311907694d3c5967
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – – 33868397a64763f16d88e37d4289697a

April 26, 2023

Score: 1 MALWARE FAMILY: TAGS:MD5: 33868397a64763f16d88e37d4289697aSHA1: 2bd06371967738d0101dc73ed3fa321cbeac4db6ANALYSIS DATE: 2023-04-26T16:00:59ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – – 33868397a64763f16d88e37d4289697a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 05cd8d500f128d1c1ab6844e5b98eb4e

April 26, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:lumma, family:smokeloader, botnet:pub1, botnet:sprg, backdoor, discovery, ransomware, stealer, trojanMD5: 05cd8d500f128d1c1ab6844e5b98eb4eSHA1: 76211cea5ed0667e98e9b99312d6a40cd6ffb1faANALYSIS DATE: 2023-04-26T15:37:31ZTTPS: T1012,...

Read MoreRead more about Malware Analysis – amadey – 05cd8d500f128d1c1ab6844e5b98eb4e
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: redos(-ruby,-time)byooooooo_q

April 26, 2023

Programme HackerOne Internet Bug Bounty Internet Bug Bounty Submitted by ooooooo_q ooooooo_q Report ReDoS( Ruby, Time) Full Report   A...

Read MoreRead more about HackerOne Bug Bounty Disclosure: redos(-ruby,-time)byooooooo_q
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: cve-2023-28755:-redos-vulnerability-in-uribydee-see

April 26, 2023

Programme HackerOne Internet Bug Bounty Internet Bug Bounty Submitted by dee-see dee-see Report CVE-2023-28755: ReDoS vulnerability in URI Full Report...

Read MoreRead more about HackerOne Bug Bounty Disclosure: cve-2023-28755:-redos-vulnerability-in-uribydee-see
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: blind-ssrf-with-escalation-possibilities-in-matrix-preview_link-apibyrevolte

April 26, 2023

Programme HackerOne Reddit Reddit Submitted by revolte revolte Report Blind SSRF with Escalation possibilities in matrix preview_link API Full Report...

Read MoreRead more about HackerOne Bug Bounty Disclosure: blind-ssrf-with-escalation-possibilities-in-matrix-preview_link-apibyrevolte
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: the-endpoint-‘/test/webhooks’-is-vulnerable-to-dns-rebindingbymuhammadilyas

April 26, 2023

Programme HackerOne Omise Omise Submitted by muhammadilyas muhammadilyas Report The endpoint '/test/webhooks' is vulnerable to DNS Rebinding Full Report  ...

Read MoreRead more about HackerOne Bug Bounty Disclosure: the-endpoint-‘/test/webhooks’-is-vulnerable-to-dns-rebindingbymuhammadilyas
iran-hacker
  • News

Charming Kitten’s New BellaCiao Malware Discovered in Multi-Country Attacks

April 26, 2023

The prolific Iranian nation-state group known as Charming Kitten is actively targeting multiple victims in the U.S., Europe, the Middle...

Read MoreRead more about Charming Kitten’s New BellaCiao Malware Discovered in Multi-Country Attacks
chinese
  • News

Chinese Hackers Spotted Using Linux Variant of PingPull in Targeted Cyberattacks

April 26, 2023

The Chinese nation-state group dubbed Alloy Taurus is using a Linux variant of a backdoor called PingPull as well as...

Read MoreRead more about Chinese Hackers Spotted Using Linux Variant of PingPull in Targeted Cyberattacks
qq
  • News

Chinese Hackers Using MgBot Malware to Target International NGOs in Mainland China

April 26, 2023

The advanced persistent threat (APT) group referred to as Evasive Panda has been observed targeting an international non-governmental organization (NGO)...

Read MoreRead more about Chinese Hackers Using MgBot Malware to Target International NGOs in Mainland China
Basta
  • Data Breach
  • Ransomware

Black Basta Ransomware Victim: GTT

April 26, 2023

Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about Black Basta Ransomware Victim: GTT
apache-superset
  • News

Apache Superset Vulnerability: Insecure Default Configuration Exposes Servers to RCE Attacks

April 26, 2023

The maintainers of the Apache Superset open source data visualization software have released fixes to plug an insecure default configuration...

Read MoreRead more about Apache Superset Vulnerability: Insecure Default Configuration Exposes Servers to RCE Attacks

Posts pagination

Previous 1 … 2,533 2,534 2,535 2,536 2,537 2,538 2,539 … 4,410 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]43[.]37[.]134:4434

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 119[.]29[.]231[.]118:443

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 39[.]101[.]74[.]162:443

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]218[.]112[.]112:8880

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]109[.]48[.]57:443

September 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel