Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025
unlock_membership
  • Premium Members Content

Mastering Secure Coding Practices to Protect Your Software

June 27, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
hacker-4
  • News

Researchers Link SideWinder Group to Dozens of Targeted Attacks in Multiple Countries

February 17, 2023

The prolific SideWinder group has been attributed as the nation-state actor behind attempted attacks against 61 entities in Afghanistan, Bhutan,...

Read MoreRead more about Researchers Link SideWinder Group to Dozens of Targeted Attacks in Multiple Countries
npm
  • News

Researchers Hijack Popular NPM Package with Millions of Downloads

February 17, 2023

A popular npm package with more than 3.5 million weekly downloads has been found vulnerable to an account takeover attack....

Read MoreRead more about Researchers Hijack Popular NPM Package with Millions of Downloads
clamav
  • News

Critical RCE Vulnerability Discovered in ClamAV Open Source Antivirus Software

February 17, 2023

Cisco has rolled out security updates to address a critical flaw reported in the ClamAV open source antivirus engine that...

Read MoreRead more about Critical RCE Vulnerability Discovered in ClamAV Open Source Antivirus Software
CISA_Logo
  • CISA

CISA: CISA Releases Fifteen Industrial Control Systems Advisories

February 17, 2023

CISA Releases Fifteen Industrial Control Systems Advisories CISA released fifteen (15) Industrial Control Systems (ICS) advisories on February 16, 2023....

Read MoreRead more about CISA: CISA Releases Fifteen Industrial Control Systems Advisories
trend-14
  • Vulnerabilities

Daily Vulnerability Trends: Thu Feb 16 2023

February 16, 2023

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2023-23514 No description provided CVE-2023-23376Windows Common Log File System Driver Elevation of...

Read MoreRead more about Daily Vulnerability Trends: Thu Feb 16 2023
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – b7718f4a9760791f4123329c0320de16

February 16, 2023

Score: 6 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: b7718f4a9760791f4123329c0320de16SHA1: f7b2bf4ae4161186442dc841363d616e479b1d2dANALYSIS DATE: 2023-02-16T03:11:47ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – b7718f4a9760791f4123329c0320de16
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 000fb3406dffe4e4933612e9f7259c52

February 16, 2023

Score: 6 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: 000fb3406dffe4e4933612e9f7259c52SHA1: c597b6898d40ea20a92a5c292d1400fa6434a9a9ANALYSIS DATE: 2023-02-16T03:30:01ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – 000fb3406dffe4e4933612e9f7259c52
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 051d5874bdc197f10e9db0668ebfb12b

February 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 051d5874bdc197f10e9db0668ebfb12bSHA1: c30a61aa11e42b444b59d842596d88004f337116ANALYSIS DATE: 2023-02-16T04:30:33ZTTPS: T1005, T1081, T1012, T1222,...

Read MoreRead more about Malware Analysis – djvu – 051d5874bdc197f10e9db0668ebfb12b
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – e5ae8001839ba54edbfec99076911622

February 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: e5ae8001839ba54edbfec99076911622SHA1: 6792e2ecffa213cbde0f36afa4d43594c93b3e09ANALYSIS DATE: 2023-02-16T04:20:29ZTTPS: T1082, T1012, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – e5ae8001839ba54edbfec99076911622
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 12abe389cca03fa67190601574816b5a

February 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:gozi, family:smokeloader, botnet:1001, backdoor, banker, discovery, isfb, persistence, ransomware, trojan, vmprotectMD5: 12abe389cca03fa67190601574816b5aSHA1: 00bc25d24abb479426e04ee7222f22dbe5b19f69ANALYSIS DATE: 2023-02-16T03:37:13ZTTPS:...

Read MoreRead more about Malware Analysis – djvu – 12abe389cca03fa67190601574816b5a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 1b0cb243ac3ee82f10ab7cc4a02109b7

February 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:gozi, family:laplas, family:rhadamanthys, family:smokeloader, family:vidar, botnet:1001, botnet:19, backdoor, banker, clipper, collection, discovery, evasion, isfb, persistence,...

Read MoreRead more about Malware Analysis – djvu – 1b0cb243ac3ee82f10ab7cc4a02109b7
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 6698f16c7ba19114051877c9d33eb69f

February 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 6698f16c7ba19114051877c9d33eb69fSHA1: 3a0ff9ad37b183f1b3d2d44638ef9ca35134ef1bANALYSIS DATE: 2023-02-16T05:41:12ZTTPS: T1005, T1081, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – 6698f16c7ba19114051877c9d33eb69f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – d0c450199d3b304ae14673b5adebc79e

February 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: d0c450199d3b304ae14673b5adebc79eSHA1: bb0048e76a4dbbba54c4979e3ac3ecd2c3540e8bANALYSIS DATE: 2023-02-16T05:30:45ZTTPS: T1012, T1082, T1060, T1112,...

Read MoreRead more about Malware Analysis – djvu – d0c450199d3b304ae14673b5adebc79e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 59d1e6cf42825dec6bc1f7ea27dd5901

February 16, 2023

Score: 7 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: 59d1e6cf42825dec6bc1f7ea27dd5901SHA1: 3949dfc0d598e87e1f51e0c4ead11058b6ed5993ANALYSIS DATE: 2023-02-16T05:14:25ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – 59d1e6cf42825dec6bc1f7ea27dd5901
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – b01a66a4ffdc6b95cd9c392a03ec43fa

February 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:gozi, family:rhadamanthys, family:smokeloader, botnet:1001, backdoor, banker, discovery, isfb, ransomware, spyware, stealer, trojan, vmprotectMD5: b01a66a4ffdc6b95cd9c392a03ec43faSHA1: ee76990db76f909aecf3692ff0586bdc1d3eec8cANALYSIS...

Read MoreRead more about Malware Analysis – djvu – b01a66a4ffdc6b95cd9c392a03ec43fa
specops-hacker-stealing
  • News

My Password Manager was Hacked! How to Prevent a Catastrophe

February 16, 2023

The LastPass security breach in late 2022 sent a shockwave through the security community. Password managers are typically seen as...

Read MoreRead more about My Password Manager was Hacked! How to Prevent a Catastrophe
evil-hacker-ai
  • News

Emsisoft says hackers are spoofing its certs to breach networks

February 16, 2023

​A hacker is using fake code-signing certificates impersonating cybersecurity firm Emsisoft to target customers using its security products, hoping to...

Read MoreRead more about Emsisoft says hackers are spoofing its certs to breach networks
City_of_Oakland
  • News

City of Oakland declares state of emergency after ransomware attack

February 16, 2023

Oakland has declared a local state of emergency because of the impact of a ransomware attack that forced the City...

Read MoreRead more about City of Oakland declares state of emergency after ransomware attack
GitHub__headpic
  • News

GitHub Copilot update stops AI model from revealing secrets

February 16, 2023

GitHub has updated the AI model of Copilot, a programming assistant that generates real-time source code and function recommendations in...

Read MoreRead more about GitHub Copilot update stops AI model from revealing secrets
hyundai
  • News

Hyundai, Kia patch bug allowing car thefts with a USB cable

February 16, 2023

Automakers Hyundai and KIA are rolling out an emergency software update on several of their car models impacted by an...

Read MoreRead more about Hyundai, Kia patch bug allowing car thefts with a USB cable
USA_justice
  • News

Russian hacker convicted of $90 million hack-to-trade charges

February 16, 2023

Russian national Vladislav Klyushin was found guilty of participating in a global scheme that involved hacking into U.S. computer networks...

Read MoreRead more about Russian hacker convicted of $90 million hack-to-trade charges
citrix-stars
  • News

Citrix fixes severe flaws in Workspace, Virtual Apps and Desktops

February 16, 2023

Citrix Systems has released security updates for vulnerabilities in its Virtual Apps and Desktops, and Workspace Apps products. The addressed...

Read MoreRead more about Citrix fixes severe flaws in Workspace, Virtual Apps and Desktops
hacker-looking-at-screens
  • News

Hackers start using Havoc post-exploitation framework in attacks

February 16, 2023

Security researchers are seeing threat actors switching to a new and open-source command and control (C2) framework known as Havoc...

Read MoreRead more about Hackers start using Havoc post-exploitation framework in attacks
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – b677e02f354bc39fbd56b84ded18922d

February 16, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, vmprotectMD5: b677e02f354bc39fbd56b84ded18922dSHA1: 9c659cf1f14487a73fc4ed0cd6bce5d428a6addbANALYSIS DATE: 2023-02-15T22:03:41ZTTPS: T1012, T1120, T1082, T1053, T1060, T1112, T1222...

Read MoreRead more about Malware Analysis – djvu – b677e02f354bc39fbd56b84ded18922d

Posts pagination

Previous 1 … 2,571 2,572 2,573 2,574 2,575 2,576 2,577 … 4,203 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Cenomi Retail

July 3, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Biofloral

July 3, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: JFC Electric

July 3, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Lydig Construction

July 3, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Metric

July 3, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel