Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – d2a2333090ea0b8ba558b5dee97e4c96

December 27, 2022

Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, ransomwareMD5: d2a2333090ea0b8ba558b5dee97e4c96SHA1: 65e6789f9f80a8a31f13e410349ff91bbfe0741dANALYSIS DATE: 2022-12-27T05:01:04ZTTPS: T1046, T1491, T1112, T1053, T1107, T1490, T1082, T1012, T1120 ScoreMeaningExample10Known...

Read MoreRead more about Malware Analysis – discovery – d2a2333090ea0b8ba558b5dee97e4c96
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 444ba93b042e74e9cfe4176d666be724

December 27, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: 444ba93b042e74e9cfe4176d666be724SHA1: 2e3698928f79ad23a6c4ee41c691e889a1bc962cANALYSIS DATE: 2022-12-27T05:45:23ZTTPS: T1012, T1082, T1060, T1112, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 444ba93b042e74e9cfe4176d666be724
image-2
  • Data Breach
  • Ransomware

Royal Ransomware Victim: Fantasy Springs Resort Casino

December 27, 2022

RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...

Read MoreRead more about Royal Ransomware Victim: Fantasy Springs Resort Casino
image-2
  • Data Breach
  • Ransomware

Royal Ransomware Victim: Robinson Pharma

December 27, 2022

RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...

Read MoreRead more about Royal Ransomware Victim: Robinson Pharma
Twitter-header
  • News

Hacker claims to be selling Twitter data of 400 million users

December 27, 2022

A threat actor claims to be selling public and private data of 400 million Twitter users scraped in 2021 using...

Read MoreRead more about Hacker claims to be selling Twitter data of 400 million users
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 3b61724b7e08dd1c22b349855b3d03f0

December 27, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 3b61724b7e08dd1c22b349855b3d03f0SHA1: 9a95ba1b832913ccb0c0ea35b9e51622e25059beANALYSIS DATE: 2022-12-26T21:51:44ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 3b61724b7e08dd1c22b349855b3d03f0
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 19660b46a1d17197b4f9f77e0e8b2c58

December 27, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, ransomware, spyware, stealerMD5: 19660b46a1d17197b4f9f77e0e8b2c58SHA1: ca057c6880fe2596193c64150d5f4d4b817be94eANALYSIS DATE: 2022-12-26T21:49:09ZTTPS: T1490, T1082, T1107, T1112, T1005, T1081 ScoreMeaningExample10Known badA...

Read MoreRead more about Malware Analysis – evasion – 19660b46a1d17197b4f9f77e0e8b2c58
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 43[.]154[.]27[.]211:888

December 27, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 43[.]154[.]27[.]211:888
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 3dd689b96e867e4397be876b882d7efd

December 27, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 3dd689b96e867e4397be876b882d7efdSHA1: d4984c84258b12ee83cfd2c583a1be5ce6ff449fANALYSIS DATE: 2022-12-26T22:17:04ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 3dd689b96e867e4397be876b882d7efd
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 29009bb31db26522fae47b13d38f7d7f

December 27, 2022

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:redline, family:smokeloader, botnet:@2023@new, backdoor, discovery, infostealer, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: 29009bb31db26522fae47b13d38f7d7fSHA1: 965778ee24becf3e4fcdd78bb4bba90c21cc2dffANALYSIS...

Read MoreRead more about Malware Analysis – amadey – 29009bb31db26522fae47b13d38f7d7f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – c5241954efde6588a6e075e5c65698e5

December 27, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: c5241954efde6588a6e075e5c65698e5SHA1: 056efac6b4e94b40128582a1ba277949131b6b67ANALYSIS DATE: 2022-12-26T23:07:18ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – c5241954efde6588a6e075e5c65698e5
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 060fc0cb2067f6436d6ac0021a1ee078

December 27, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: 060fc0cb2067f6436d6ac0021a1ee078SHA1: 887c9754f6bd578af346a125eba14ee09beb09c7ANALYSIS DATE: 2022-12-26T22:30:09ZTTPS: T1060, T1112, T1222, T1053, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 060fc0cb2067f6436d6ac0021a1ee078
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 107[.]148[.]53[.]252:801

December 27, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 107[.]148[.]53[.]252:801
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 47[.]243[.]200[.]118:443

December 27, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 47[.]243[.]200[.]118:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 101[.]99[.]90[.]18:443

December 27, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 101[.]99[.]90[.]18:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 43[.]128[.]66[.]61:8888

December 27, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 43[.]128[.]66[.]61:8888
osint
  • News

CISO’s Challenges Involved with Business Leader & SOC

December 26, 2022

Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT. If you...

Read MoreRead more about CISO’s Challenges Involved with Business Leader & SOC
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – b08d363ca421b7a47c021f924f48a270

December 26, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: b08d363ca421b7a47c021f924f48a270SHA1: d4baa6673c5b9ed1fa37cd348d92ad934db3280bANALYSIS DATE: 2022-12-26T15:06:51ZTTPS: T1005, T1081, T1082, T1222, T1012, T1060,...

Read MoreRead more about Malware Analysis – djvu – b08d363ca421b7a47c021f924f48a270
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: account-takeover—improper-validation-of-jwt-signature-(with-regards–to-experiation-date-claim)bytwelvesix

December 26, 2022

Programme HackerOne Linktree Linktree Submitted by twelvesix twelvesix Report Account takeover - improper validation of jwt signature (with regards to...

Read MoreRead more about HackerOne Bug Bounty Disclosure: account-takeover—improper-validation-of-jwt-signature-(with-regards–to-experiation-date-claim)bytwelvesix
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: cve-2022-43552:-http-proxy-deny-use-after-freebybagder

December 26, 2022

Programme HackerOne curl curl Submitted by bagder bagder Report CVE-2022-43552: HTTP Proxy deny use-after-free Full Report A considerable amount of...

Read MoreRead more about HackerOne Bug Bounty Disclosure: cve-2022-43552:-http-proxy-deny-use-after-freebybagder
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – 029b5d34e91b7ee1e4084d4f6a76710d

December 26, 2022

Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, evasion, persistence, ransomwareMD5: 029b5d34e91b7ee1e4084d4f6a76710dSHA1: eba9b85d8d6800fa7ccfc2bc78f9ca8029a0d0d5ANALYSIS DATE: 2022-12-26T15:42:00ZTTPS: T1107, T1490, T1031, T1562, T1489, T1060, T1112, T1012,...

Read MoreRead more about Malware Analysis – discovery – 029b5d34e91b7ee1e4084d4f6a76710d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 92ec81034584caac63fdb1e2899fb3bf

December 26, 2022

Score: 8 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: 92ec81034584caac63fdb1e2899fb3bfSHA1: e170f445625088eb270ea8e8ef89f1ddd55266c4ANALYSIS DATE: 2022-12-26T15:36:44ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – 92ec81034584caac63fdb1e2899fb3bf
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 01581eb9c54ea83c51af5e0fce922181

December 26, 2022

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, backdoor, collection, discovery, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: 01581eb9c54ea83c51af5e0fce922181SHA1: 8e49ef428f3afc4686997eb9b0428a070160f4f4ANALYSIS DATE: 2022-12-26T16:05:24ZTTPS:...

Read MoreRead more about Malware Analysis – amadey – 01581eb9c54ea83c51af5e0fce922181
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 5d24300cf4c11ecac3cd1efcffecc52c

December 26, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: 5d24300cf4c11ecac3cd1efcffecc52cSHA1: 16a0d1a7dd27f6ea29125f4f7b1b68b4ba648ac9ANALYSIS DATE: 2022-12-26T16:02:46ZTTPS: T1222, T1053, T1005, T1081, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – 5d24300cf4c11ecac3cd1efcffecc52c

Posts pagination

Previous 1 … 2,562 2,563 2,564 2,565 2,566 2,567 2,568 … 4,072 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-46717

May 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46718

May 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-26841

May 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-26846

May 13, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-56523

May 13, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel