Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025
unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Store-broke
  • News

Microsoft shares workaround for unresponsive Windows Start Menu

January 25, 2023

Microsoft has confirmed an issue causing the Windows Start menu to become unresponsive and some applications to no longer launch....

Read MoreRead more about Microsoft shares workaround for unresponsive Windows Start Menu
VMware-headpic
  • News

VMware fixes critical security bugs in vRealize log analysis tool

January 25, 2023

VMware released security patches on Tuesday to address vRealize Log Insight vulnerabilities that could enable attackers to gain remote execution...

Read MoreRead more about VMware fixes critical security bugs in vRealize log analysis tool
WordPress
  • News

75k WordPress sites impacted by critical online course plugin flaws

January 25, 2023

The WordPress online course plugin 'LearnPress' was vulnerable to multiple critical-severity flaws, including pre-auth SQL injection and local file inclusion....

Read MoreRead more about 75k WordPress sites impacted by critical online course plugin flaws
global-pew-pew
  • News

Russia’s largest ISP says 2022 broke all DDoS attack records

January 25, 2023

Russia's largest internet service provider Rostelecom says 2022 was a record year for Distributed denial of service attacks (DDoS) targeting...

Read MoreRead more about Russia’s largest ISP says 2022 broke all DDoS attack records
cryptocurrency-header
  • News

FBI: North Korean hackers stole $100 million in Harmony crypto hack

January 25, 2023

The FBI has confirmed that the North Korean state-sponsored 'Lazarus' and APT38 hacking groups were behind the theft of $100...

Read MoreRead more about FBI: North Korean hackers stole $100 million in Harmony crypto hack
cyber-smiley-lower
  • News

Ransomware access brokers use Google ads to breach your network

January 25, 2023

A threat actor tracked as DEV-0569 uses Google Ads in widespread, ongoing advertising campaigns to distribute malware, steal victims' passwords,...

Read MoreRead more about Ransomware access brokers use Google ads to breach your network
Riot_Games_headpic
  • News

Riot Games receives ransom demand from hackers, refuses to pay

January 25, 2023

Riot Games says it will not pay a $10 million ransom demanded by attackers who stole League of Legends source code...

Read MoreRead more about Riot Games receives ransom demand from hackers, refuses to pay
Google-1
  • News

U.S. sues Google for abusing dominance over online ad market

January 25, 2023

The U.S. Justice Department has filed a federal lawsuit today against Google for abusing its dominant position in the online...

Read MoreRead more about U.S. sues Google for abusing dominance over online ad market
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 179[.]43[.]162[.]31:80

January 25, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 179[.]43[.]162[.]31:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 198[.]154[.]94[.]36:443

January 25, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 198[.]154[.]94[.]36:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 3[.]73[.]0[.]134:80

January 25, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 3[.]73[.]0[.]134:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 120[.]48[.]99[.]90:80

January 25, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 120[.]48[.]99[.]90:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 91[.]213[.]50[.]35:443

January 25, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 91[.]213[.]50[.]35:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 43[.]138[.]21[.]132:8808

January 25, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 43[.]138[.]21[.]132:8808
brute_ratel_c4
  • Brute Ratel C4

Brute Ratel C4 Detected – 54[.]249[.]216[.]44:80

January 25, 2023

The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...

Read MoreRead more about Brute Ratel C4 Detected – 54[.]249[.]216[.]44:80
CISA_Logo
  • News

US-CERT Bulletin (SB23-023):Vulnerability Summary for the Week of January 16, 2023

January 24, 2023

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...

Read MoreRead more about US-CERT Bulletin (SB23-023):Vulnerability Summary for the Week of January 16, 2023
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: elsan[.]care

January 24, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: elsan[.]care
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: using-special-ipv4-mapped-ipv6-addresses-to-bypass-local-ip-banbyalbertspedersen

January 24, 2023

Programme HackerOne Cloudflare Public Bug Bounty Cloudflare Public Bug Bounty Submitted by albertspedersen albertspedersen Report Using special IPv4-mapped IPv6 addresses...

Read MoreRead more about HackerOne Bug Bounty Disclosure: using-special-ipv4-mapped-ipv6-addresses-to-bypass-local-ip-banbyalbertspedersen
CISA_Logo
  • CISA

CISA: CISA Releases Protecting Our Future: Partnering to Safeguard K–12 organizations from Cybersecurity Threats

January 24, 2023

CISA Releases Protecting Our Future: Partnering to Safeguard K–12 organizations from Cybersecurity Threats Today, CISA released Protecting Our Future: Partnering...

Read MoreRead more about CISA: CISA Releases Protecting Our Future: Partnering to Safeguard K–12 organizations from Cybersecurity Threats
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: xlntinc[.]com

January 24, 2023

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: xlntinc[.]com
62d0e102020d41282179f4c2acaf3d99ca8426a1dfb3e95a34bb6e756fcd87dc
  • Tools

Get-AppLockerEventlog – Script For Fetching Applocker Event Log By Parsing The Win-Event Log

January 24, 2023

This script will parse all the channels of events from the win-event log to extract all the log relatives to...

Read MoreRead more about Get-AppLockerEventlog – Script For Fetching Applocker Event Log By Parsing The Win-Event Log
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – c7a9226978be7b4ead9febb8ac854e7c

January 24, 2023

Score: 6 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: c7a9226978be7b4ead9febb8ac854e7cSHA1: cb7e60b4c4c4f4737c4cfe74addde018515918dfANALYSIS DATE: 2023-01-24T09:00:06ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – c7a9226978be7b4ead9febb8ac854e7c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 6735e0d9fc3b11c7cbdd071d3829162b

January 24, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 6735e0d9fc3b11c7cbdd071d3829162bSHA1: 1ebc132342713c73f1020c8012b0b5063c28b2aaANALYSIS DATE: 2023-01-24T09:04:30ZTTPS: T1012, T1082, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 6735e0d9fc3b11c7cbdd071d3829162b
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – upx – 5f586940f6b6ae2f8cbdeaec316b62ef

January 24, 2023

Score: 9 MALWARE FAMILY: upxTAGS:upxMD5: 5f586940f6b6ae2f8cbdeaec316b62efSHA1: 97197beb2de16b0b38c20b4846f4325283f28356ANALYSIS DATE: 2023-01-24T09:57:48ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – upx – 5f586940f6b6ae2f8cbdeaec316b62ef

Posts pagination

Previous 1 … 2,667 2,668 2,669 2,670 2,671 2,672 2,673 … 4,242 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[FLOCKER] – Ransomware Victim: G*********************y[.]org

July 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53101

July 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53019

July 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53819

July 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-53821

July 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel