Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CISA_Logo
  • CISA

CISA: CISA Requests for Comment on Secure Software Self-Attestation Form

May 9, 2023

CISA Requests for Comment on Secure Software Self-Attestation Form CISA has issued requests for comment on the Secure Software Self-Attestation...

Read MoreRead more about CISA: CISA Requests for Comment on Secure Software Self-Attestation Form
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 206[.]119[.]74[.]215:80

May 9, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 206[.]119[.]74[.]215:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 209[.]97[.]135[.]107:80

May 9, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 209[.]97[.]135[.]107:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 20[.]119[.]42[.]48:443

May 9, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 20[.]119[.]42[.]48:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 8[.]141[.]161[.]11:6666

May 9, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 8[.]141[.]161[.]11:6666
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 101[.]43[.]224[.]186:443

May 9, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 101[.]43[.]224[.]186:443
CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of April 24, 2023

May 8, 2023

   The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...

Read MoreRead more about US-CERT Vulnerability Summary for the Week of April 24, 2023
46b5cbcca1c64adf5905d98ffff6ac83ba8d871d0a266d26d3cf4e1d5ab22498
  • Tools

Nimbo-C2 – Yet Another (Simple And Lightweight) C2 Framework

May 8, 2023

About Nimbo-C2 is yet another (simple and lightweight) C2 framework. Nimbo-C2 agent supports x64 Windows & Linux. It's written in...

Read MoreRead more about Nimbo-C2 – Yet Another (Simple And Lightweight) C2 Framework
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 32b3fe74b988b12fcb484850f17d1721

May 8, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, botnet:pub1, botnet:sprg, backdoor, discovery, ransomware, trojanMD5: 32b3fe74b988b12fcb484850f17d1721SHA1: f6d21919f699f4a903ccc382bbce215642aa1db4ANALYSIS DATE: 2023-05-08T15:30:14ZTTPS: T1012, T1222, T1053,...

Read MoreRead more about Malware Analysis – amadey – 32b3fe74b988b12fcb484850f17d1721
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 941dc581a841ce8fc209aab1345fabba

May 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:31c7719b5ee962fbde376b75e771360d, discovery, persistence, ransomware, spyware, stealerMD5: 941dc581a841ce8fc209aab1345fabbaSHA1: 6473ef23e5f87d642fdb249d2ce01993a5aa30edANALYSIS DATE: 2023-05-08T15:22:13ZTTPS: T1082, T1053, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 941dc581a841ce8fc209aab1345fabba
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 727b9c1facb2764ed3b69f34078ec711

May 8, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, botnet:pub1, botnet:sprg, backdoor, discovery, ransomware, trojanMD5: 727b9c1facb2764ed3b69f34078ec711SHA1: 965c066af34f939ac544fdf702b6609979f9d79dANALYSIS DATE: 2023-05-08T15:09:16ZTTPS: T1053, T1012, T1120,...

Read MoreRead more about Malware Analysis – amadey – 727b9c1facb2764ed3b69f34078ec711
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 3f96efacd3ab4a4b6ecba23fa0b99390

May 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:31c7719b5ee962fbde376b75e771360d, discovery, persistence, ransomware, spyware, stealerMD5: 3f96efacd3ab4a4b6ecba23fa0b99390SHA1: c73f24a0f81267cac9045dd93d8e0805f6026c35ANALYSIS DATE: 2023-05-08T14:58:54ZTTPS: T1012, T1082, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 3f96efacd3ab4a4b6ecba23fa0b99390
A,Wooden,House,Stops,The,Collapse,Of,The,Pieces,Of
  • Premium Members Content

Daily Threat Intelligence – May 08 – 2023

May 8, 2023

The stealth with which ransomware operations run today is highly intimidating to businesses. Researchers have stumbled across a couple of...

Read MoreRead more about Daily Threat Intelligence – May 08 – 2023
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – bf3a2484532f79b9a300bda711005470

May 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:31c7719b5ee962fbde376b75e771360d, discovery, persistence, ransomware, spyware, stealerMD5: bf3a2484532f79b9a300bda711005470SHA1: 29e99330b4d07f80ff48a7d7c2c265262b8f1713ANALYSIS DATE: 2023-05-08T16:08:47ZTTPS: T1005, T1081, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – bf3a2484532f79b9a300bda711005470
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 0e71e6e602e6cfb38ea3567ac1130343

May 8, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, botnet:pub1, botnet:sprg, backdoor, discovery, ransomware, trojanMD5: 0e71e6e602e6cfb38ea3567ac1130343SHA1: 8c50ae1dcfafd674643af4814f7b96ed835ef22aANALYSIS DATE: 2023-05-08T16:02:22ZTTPS: T1012, T1120, T1082,...

Read MoreRead more about Malware Analysis – amadey – 0e71e6e602e6cfb38ea3567ac1130343
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 727b2d3ec84ce3139998a79342fa324b

May 8, 2023

Score: 6 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: 727b2d3ec84ce3139998a79342fa324bSHA1: 503f4998eb0e88388e82dca578c411a2cfe6455aANALYSIS DATE: 2023-05-08T17:00:12ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – 727b2d3ec84ce3139998a79342fa324b
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 51064cc8676f45813dec4c5a1c1ce150

May 8, 2023

Score: 7 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: 51064cc8676f45813dec4c5a1c1ce150SHA1: e9d2c7b278c98f85481176c6089b2a74120c6b56ANALYSIS DATE: 2023-05-08T16:39:39ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – 51064cc8676f45813dec4c5a1c1ce150
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – – 21d01fa87dfcaf971ff7b63a1a6fda94

May 8, 2023

Score: 1 MALWARE FAMILY: TAGS:MD5: 21d01fa87dfcaf971ff7b63a1a6fda94SHA1: f3caa9831fc715af4f47cd98803549902dffe30aANALYSIS DATE: 2023-05-08T17:48:48ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – – 21d01fa87dfcaf971ff7b63a1a6fda94
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – dharma – 5c36e305d926e55ef98d392176890cd2

May 8, 2023

Score: 10 MALWARE FAMILY: dharmaTAGS:family:dharma, discovery, evasion, ransomwareMD5: 5c36e305d926e55ef98d392176890cd2SHA1: 64a15cdf89b6c8b85cba355b6944074614d810fdANALYSIS DATE: 2023-05-08T17:48:49ZTTPS: T1490, T1059, T1107, T1082, T1012, T1120, T1070, T1053,...

Read MoreRead more about Malware Analysis – dharma – 5c36e305d926e55ef98d392176890cd2
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – banker – 14f1074238583c9afde262fb31782ac9

May 8, 2023

Score: 8 MALWARE FAMILY: bankerTAGS:banker, evasion, ransomwareMD5: 14f1074238583c9afde262fb31782ac9SHA1: b20c3d6ec14d707ae1da754810d63b8e0b8bbee0ANALYSIS DATE: 2023-05-08T17:45:43ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – banker – 14f1074238583c9afde262fb31782ac9
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 9634b28186b502eab4ead6119285f4d7

May 8, 2023

Score: 8 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 9634b28186b502eab4ead6119285f4d7SHA1: 62bcdb03dbd6bf9fc0383582b5108e8b8b0b04a3ANALYSIS DATE: 2023-05-08T17:48:51ZTTPS: T1005, T1081 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – ransomware – 9634b28186b502eab4ead6119285f4d7
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 9d44fd089264803ad86f41edd56aef4d

May 8, 2023

Score: 8 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 9d44fd089264803ad86f41edd56aef4dSHA1: 936787fa460b642d6d84e4edf0fc92d1751f8b35ANALYSIS DATE: 2023-05-08T17:48:53ZTTPS: T1005, T1081 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – ransomware – 9d44fd089264803ad86f41edd56aef4d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – chaos – 9eb958c38bd3d39c55b009f9a200f42f

May 8, 2023

Score: 10 MALWARE FAMILY: chaosTAGS:family:chaos, ransomware, spyware, stealerMD5: 9eb958c38bd3d39c55b009f9a200f42fSHA1: b5ab794dd5821d08f7ecd860ba7975a6644dd46dANALYSIS DATE: 2023-05-08T17:48:53ZTTPS: T1491, T1112, T1082, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – chaos – 9eb958c38bd3d39c55b009f9a200f42f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – chaos – deb8f4311fd52319f6168c10b626c808

May 8, 2023

Score: 10 MALWARE FAMILY: chaosTAGS:family:chaos, evasion, ransomware, spyware, stealerMD5: deb8f4311fd52319f6168c10b626c808SHA1: f4807d71a1048d05815a09b74997f338e26ba9ffANALYSIS DATE: 2023-05-08T17:48:55ZTTPS: T1490, T1059, T1107, T1012, T1491, T1112, T1005,...

Read MoreRead more about Malware Analysis – chaos – deb8f4311fd52319f6168c10b626c808

Posts pagination

Previous 1 … 2,577 2,578 2,579 2,580 2,581 2,582 2,583 … 4,504 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-48703 – centos-webpanel – CentOS Web Panel

November 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-11371 – Gladinet – CentreStack and TrioFox

November 4, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Prova

November 4, 2025
image
  • Data Breach
  • Ransomware

[COINBASECARTEL] – Ransomware Victim: Property Finder / PropSpace

November 4, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: MS Metal Solutions

November 4, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel