Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 177b4a7c81cecf64811c06aba1bd56df

March 9, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:laplas, family:smokeloader, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, botnet:pub1, botnet:sprg, backdoor, clipper, discovery, evasion, persistence, pyinstaller, ransomware, stealer,...

Read MoreRead more about Malware Analysis – amadey – 177b4a7c81cecf64811c06aba1bd56df
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 5f0ba5567cbd04f4528289d3fa64075d

March 9, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: 5f0ba5567cbd04f4528289d3fa64075dSHA1: 745147caf91e2c4aefbf68e75156e19e8f7400f6ANALYSIS DATE: 2023-03-09T16:41:13ZTTPS: T1060, T1112, T1082, T1012,...

Read MoreRead more about Malware Analysis – djvu – 5f0ba5567cbd04f4528289d3fa64075d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – 0acd5fdeb1332e99679f9c5403fd5dbe

March 9, 2023

Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, evasion, persistence, ransomware, trojanMD5: 0acd5fdeb1332e99679f9c5403fd5dbeSHA1: 9941abbb97c285b8528830cae8762b251e16991aANALYSIS DATE: 2023-03-09T16:57:34ZTTPS: T1102, T1112, T1107, T1490, T1060, T1031, T1562,...

Read MoreRead more about Malware Analysis – discovery – 0acd5fdeb1332e99679f9c5403fd5dbe
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 8f815dd83d1432167479a2ec981834fd

March 9, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: 8f815dd83d1432167479a2ec981834fdSHA1: 8ea74de3209010e6dd81dd3dc66214a7878dd5ebANALYSIS DATE: 2023-03-09T16:42:57ZTTPS: T1060, T1112, T1082, T1005,...

Read MoreRead more about Malware Analysis – djvu – 8f815dd83d1432167479a2ec981834fd
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 018791f76b98abc15177ca780693eeb5

March 9, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:laplas, family:smokeloader, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, botnet:pub1, botnet:sprg, backdoor, clipper, discovery, persistence, pyinstaller, ransomware, stealer, trojanMD5:...

Read MoreRead more about Malware Analysis – amadey – 018791f76b98abc15177ca780693eeb5
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 58556e2d969b55db9c1731ee540cb31f

March 9, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: 58556e2d969b55db9c1731ee540cb31fSHA1: e36eafc1c83133c0b4f322017b1be84e7c11eb9aANALYSIS DATE: 2023-03-09T17:38:47ZTTPS: T1060, T1112, T1012, T1005,...

Read MoreRead more about Malware Analysis – djvu – 58556e2d969b55db9c1731ee540cb31f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 6bdc4ff9c91e4846d8924c28d7e909da

March 9, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: 6bdc4ff9c91e4846d8924c28d7e909daSHA1: c504e74669f65893874e77d70d78c01526694d54ANALYSIS DATE: 2023-03-09T17:47:29ZTTPS: T1222, T1060, T1112, T1005,...

Read MoreRead more about Malware Analysis – djvu – 6bdc4ff9c91e4846d8924c28d7e909da
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 7b8fa1719da67f606547a11c93356b2e

March 9, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:laplas, family:pseudomanuscrypt, family:smokeloader, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, botnet:pub1, botnet:sprg, backdoor, clipper, discovery, evasion, loader, persistence, ransomware,...

Read MoreRead more about Malware Analysis – amadey – 7b8fa1719da67f606547a11c93356b2e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – f65c1bc6f57a0964c1cb68ef89ad44c6

March 9, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: f65c1bc6f57a0964c1cb68ef89ad44c6SHA1: d46497b7e0200fc399e964339b0a7805f2551ab4ANALYSIS DATE: 2023-03-09T17:34:46ZTTPS: T1082, T1005, T1081, T1012,...

Read MoreRead more about Malware Analysis – djvu – f65c1bc6f57a0964c1cb68ef89ad44c6
remote
  • News

Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware

March 9, 2023

Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors to deploy the...

Read MoreRead more about Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware
linux-ransomware
  • News

IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks

March 9, 2023

A previously known Windows-based ransomware strain known as IceFire has expanded its focus to target Linux enterprise networks belonging to...

Read MoreRead more about IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks
android
  • News

Android March 2023 update fixes two critical code execution flaws

March 9, 2023

Google has released March 2023 security updates for Android, fixing a total of 60 flaws, and among them, two critical-severity...

Read MoreRead more about Android March 2023 update fixes two critical code execution flaws
acer-header
  • News

Acer confirms breach after 160GB of data for sale on hacking forum

March 9, 2023

Taiwanese computer giant Acer confirmed that it suffered a data breach after threat actors hacked a server hosting private documents...

Read MoreRead more about Acer confirms breach after 160GB of data for sale on hacking forum
header
  • News

DuckDuckGo launches AI-powered search query answering tool

March 9, 2023

Privacy-focused search engine DuckDuckGo has launched the first beta version of DuckAssist, an AI-assisted feature that writes accurate summaries to...

Read MoreRead more about DuckDuckGo launches AI-powered search query answering tool
hacker
  • News

New malware variant has “radio silence” mode to evade detection

March 9, 2023

The Sharp Panda cyber-espionage hacking group is targeting high-profile government entities in Vietnam, Thailand, and Indonesia with a new version of...

Read MoreRead more about New malware variant has “radio silence” mode to evade detection
outpost-24
  • News

Pen Testers using Vulnerability Scanners – Closing the Gap

March 9, 2023

Vulnerability scanning is a common practice for businesses to verify and harden their security controls, and because of its popularity,...

Read MoreRead more about Pen Testers using Vulnerability Scanners – Closing the Gap
Hospital-headpic
  • News

Hospital Clínic de Barcelona severely impacted by ransomware attack

March 9, 2023

The Hospital Clínic de Barcelona suffered a ransomware attack on Sunday morning, severely disrupting its healthcare services after the institution's...

Read MoreRead more about Hospital Clínic de Barcelona severely impacted by ransomware attack
Emotet-map
  • News

Emotet malware attacks return after three-month break

March 9, 2023

The Emotet malware operation is again spamming malicious emails as of Tuesday morning after a three-month break, rebuilding its network...

Read MoreRead more about Emotet malware attacks return after three-month break
US-Capitol-Congress
  • News

FBI investigates data breach impacting U.S. House members and staff

March 9, 2023

The FBI is investigating a data breach affecting U.S. House of Representatives members and staff after their account and sensitive...

Read MoreRead more about FBI investigates data breach impacting U.S. House members and staff
Bitwarden_headpic
  • News

Bitwarden flaw can let hackers steal passwords using iframes

March 9, 2023

Bitwarden's credentials autofill feature contains a risky behavior that could allow malicious iframes embedded in trusted websites to steal people's...

Read MoreRead more about Bitwarden flaw can let hackers steal passwords using iframes
mps
  • News

Ransomware gang posts video of data stolen from Minneapolis schools

March 9, 2023

The Medusa ransomware gang is demanding a $1,000,000 ransom from the Minneapolis Public Schools (MPS) district to delete data allegedly...

Read MoreRead more about Ransomware gang posts video of data stolen from Minneapolis schools
Veeam
  • News

Veeam fixes bug that lets hackers breach backup infrastructure

March 9, 2023

Veeam urged customers to patch a high-severity Backup Service security vulnerability impacting its Backup & Replication software. The flaw (tracked...

Read MoreRead more about Veeam fixes bug that lets hackers breach backup infrastructure
Fortinet
  • News

Fortinet warns of new critical unauthenticated RCE vulnerability

March 9, 2023

Fortinet has disclosed a "Critical" vulnerability impacting FortiOS and FortiProxy, which allows an unauthenticated attacker to execute arbitrary code or...

Read MoreRead more about Fortinet warns of new critical unauthenticated RCE vulnerability
iran-hackers
  • News

Iranian Hackers Target Women Involved in Human Rights and Middle East Politics

March 9, 2023

Iranian state-sponsored actors are continuing to engage in social engineering campaigns targeting researchers by impersonating a U.S. think tank. "Notably...

Read MoreRead more about Iranian Hackers Target Women Involved in Human Rights and Middle East Politics

Posts pagination

Previous 1 … 2,699 2,700 2,701 2,702 2,703 2,704 2,705 … 4,410 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]43[.]37[.]134:4434

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 119[.]29[.]231[.]118:443

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 39[.]101[.]74[.]162:443

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]218[.]112[.]112:8880

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]109[.]48[.]57:443

September 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel