Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Ethical Hacking and Penetration Testing: A Practical Guide to Secure Systems

November 3, 2025
unlock_membership
  • Premium Members Content

Ransomware Attacks Demystified A Practical Guide for 2025

October 29, 2025
unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
linux-security-headpic
  • News

Chinese hackers use new Linux malware variants for espionage

April 27, 2023

Hackers are deploying new Linux malware variants in cyberespionage attacks, such as a new PingPull variant and a previously undocumented...

Read MoreRead more about Chinese hackers use new Linux malware variants for espionage
arrested-1
  • News

Ukrainian arrested for selling data of 300M people to Russians

April 27, 2023

The Ukrainian cyber police have arrested a 36-year-old man from the city of Netishyn for selling the personal data and...

Read MoreRead more about Ukrainian arrested for selling data of 300M people to Russians
papercut-jeader-1
  • News

Clop, LockBit ransomware gangs behind PaperCut server attacks

April 27, 2023

​Microsoft has attributed recent attacks on PaperCut servers to the Clop and LockBit ransomware operations, which used the vulnerabilities to...

Read MoreRead more about Clop, LockBit ransomware gangs behind PaperCut server attacks
Panda_hackers
  • News

Tencent QQ users hacked in mysterious malware attack, says ESET

April 27, 2023

A Chinese APT hacking group known as 'Evasive Panda' is linked to a mysterious attack that distributed the MsgBot malware as...

Read MoreRead more about Tencent QQ users hacked in mysterious malware attack, says ESET
Cisco_headpic
  • News

Cisco discloses XSS zero-day flaw in server management tool

April 27, 2023

Cisco disclosed today a zero-day vulnerability in the company's Prime Collaboration Deployment (PCD) software that can be exploited for cross-site...

Read MoreRead more about Cisco discloses XSS zero-day flaw in server management tool
PrestaShop_headpic
  • News

PrestaShop fixes bug that lets any backend user delete databases

April 27, 2023

The open-source e-commerce platform PrestaShop has released a new version that addresses a critical-severity vulnerability allowing any back-office user to...

Read MoreRead more about PrestaShop fixes bug that lets any backend user delete databases
CISA_Logo
  • CISA

CISA: Drupal Releases Security Advisory to Address Vulnerability in Drupal Core

April 27, 2023

Drupal Releases Security Advisory to Address Vulnerability in Drupal Core Drupal has released a security advisory to address an access...

Read MoreRead more about CISA: Drupal Releases Security Advisory to Address Vulnerability in Drupal Core
CISA_Logo
  • CISA

CISA: CISA Releases One Industrial Control Systems Advisory

April 27, 2023

CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on April 20, 2023. These...

Read MoreRead more about CISA: CISA Releases One Industrial Control Systems Advisory
CISA_Logo
  • CISA

CISA: Oracle Releases Security Updates

April 27, 2023

Oracle Releases Security Updates Oracle has released its Critical Patch Update Advisory, Solaris Third Party Bulletin, and Linux Bulletin for...

Read MoreRead more about CISA: Oracle Releases Security Updates
CISA_Logo
  • CISA

CISA: Cisco Releases Security Advisories for Multiple Products

April 27, 2023

Cisco Releases Security Advisories for Multiple Products Cisco has released security updates for vulnerabilities affecting Industrial Network Director (IND), Modeling...

Read MoreRead more about CISA: Cisco Releases Security Advisories for Multiple Products
CISA_Logo
  • CISA

CISA: CISA to Continue and Enhance U.K.’s Logging Made Easy Tool

April 27, 2023

CISA to Continue and Enhance U.K.’s Logging Made Easy Tool CISA has announced plans to continue and enhance the Logging...

Read MoreRead more about CISA: CISA to Continue and Enhance U.K.’s Logging Made Easy Tool
ransomhouse-1
  • Data Breach
  • Ransomware

RansomHouse Ransomware Victim: OMT Officine Meccaniche Torino S[.]p[.]A[.]

April 27, 2023

  RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about RansomHouse Ransomware Victim: OMT Officine Meccaniche Torino S[.]p[.]A[.]
CISA_Logo
  • CISA

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

April 27, 2023

CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...

Read MoreRead more about CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA_Logo
  • CISA

CISA: CISA Releases Two Industrial Control Systems Advisories

April 27, 2023

CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on April 25, 2023. These...

Read MoreRead more about CISA: CISA Releases Two Industrial Control Systems Advisories
CISA_Logo
  • CISA

CISA: VMware Releases Security Update for Aria Operations for Logs

April 27, 2023

VMware Releases Security Update for Aria Operations for Logs VMware has released a security update to address multiple vulnerabilities in...

Read MoreRead more about CISA: VMware Releases Security Update for Aria Operations for Logs
CISA_Logo
  • CISA

CISA: Abuse of the Service Location Protocol May Lead to DoS Attacks

April 27, 2023

Abuse of the Service Location Protocol May Lead to DoS Attacks The Service Location Protocol (SLP, RFC 2608(link is external))...

Read MoreRead more about CISA: Abuse of the Service Location Protocol May Lead to DoS Attacks
CISA_Logo
  • CISA

CISA: CISA Releases Two SBOM Documents

April 27, 2023

CISA Releases Two SBOM Documents Today, CISA released two community-drafted documents around Software Bill of Materials (SBOM): Types of SBOM...

Read MoreRead more about CISA: CISA Releases Two SBOM Documents
brute_ratel_c4
  • Brute Ratel C4

Brute Ratel C4 Detected – 2600:9000:201b:aa00:16:f834:8940:93a1:80

April 27, 2023

The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...

Read MoreRead more about Brute Ratel C4 Detected – 2600:9000:201b:aa00:16:f834:8940:93a1:80
CISA_Logo
  • News

US-CERT Vulnerability Summary for the Week of April 17, 2023

April 26, 2023

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...

Read MoreRead more about US-CERT Vulnerability Summary for the Week of April 17, 2023
8917a5ac90d3155577460b44bcabbf620cc34af1863ec8d0945deb5b52115601
  • Tools

PortEx – Java Library To Analyse Portable Executable Files With A Special Focus On Malware Analysis And PE Malformation Robustness

April 26, 2023

PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness,...

Read MoreRead more about PortEx – Java Library To Analyse Portable Executable Files With A Special Focus On Malware Analysis And PE Malformation Robustness
8b70_Shutterstock_2264612211
  • Premium Members Content

Daily Threat Intelligence – April 26 – 2023

April 26, 2023

Chinese cybercriminals were reported using new malware variants in their espionage attacks against South Africa and Nepal. The campaign includes...

Read MoreRead more about Daily Threat Intelligence – April 26 – 2023
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 2e2d214abd61d6b40e8ad5e9e437df45

April 26, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:lumma, family:smokeloader, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:pub1, botnet:sprg, backdoor, discovery, persistence, ransomware, spyware, stealer, trojanMD5: 2e2d214abd61d6b40e8ad5e9e437df45SHA1:...

Read MoreRead more about Malware Analysis – amadey – 2e2d214abd61d6b40e8ad5e9e437df45
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 51a4106e8f56ecb11ff22995f4cfd3e1

April 26, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, spyware, stealerMD5: 51a4106e8f56ecb11ff22995f4cfd3e1SHA1: 2781e07822cf8b54406d5785e0e71e3158f4666fANALYSIS DATE: 2023-04-26T15:49:43ZTTPS: T1012, T1082, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 51a4106e8f56ecb11ff22995f4cfd3e1
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – fd68d6d16b3b5a68311907694d3c5967

April 26, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:lumma, family:redline, family:smokeloader, family:vidar, botnet:1379752987, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:sprg, backdoor, discovery, evasion, infostealer, persistence, ransomware, spyware,...

Read MoreRead more about Malware Analysis – amadey – fd68d6d16b3b5a68311907694d3c5967

Posts pagination

Previous 1 … 2,628 2,629 2,630 2,631 2,632 2,633 2,634 … 4,505 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]41[.]167[.]80:80

November 5, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 38[.]190[.]224[.]63:80

November 5, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 152[.]32[.]251[.]78:80

November 5, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 156[.]233[.]233[.]134:80

November 5, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 124[.]220[.]164[.]98:80

November 5, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel