Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: mail-app-stores-cleartext-password-in-database-until-oauth2-setup-is-donebychristophwurst

March 8, 2023

Programme HackerOne Nextcloud Nextcloud Submitted by christophwurst christophwurst Report Mail app stores cleartext password in database until OAUTH2 setup is...

Read MoreRead more about HackerOne Bug Bounty Disclosure: mail-app-stores-cleartext-password-in-database-until-oauth2-setup-is-donebychristophwurst
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – cf5d70e9da8dd67bc9d9fb9e0d60a9d6

March 8, 2023

Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, persistence, ransomware, upxMD5: cf5d70e9da8dd67bc9d9fb9e0d60a9d6SHA1: 13b699cc65af670fc51b117a8344648840eefaddANALYSIS DATE: 2023-03-08T15:32:17ZTTPS: T1012, T1120, T1082, T1050 ScoreMeaningExample10Known badA malware family...

Read MoreRead more about Malware Analysis – discovery – cf5d70e9da8dd67bc9d9fb9e0d60a9d6
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – d65e8623c52eadbd5d75a1f515d49500

March 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: d65e8623c52eadbd5d75a1f515d49500SHA1: 750dc8abea1f81ba18baa69d714a5df070dd6d00ANALYSIS DATE: 2023-03-08T15:22:25ZTTPS: T1060, T1112, T1082, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – d65e8623c52eadbd5d75a1f515d49500
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – chaos – b431bf2649aee55b729f1668a7bc4b12

March 8, 2023

Score: 10 MALWARE FAMILY: chaosTAGS:family:chaos, evasion, ransomware, spyware, stealerMD5: b431bf2649aee55b729f1668a7bc4b12SHA1: f618c191798cd8a809120bbf6b09ff79d8877138ANALYSIS DATE: 2023-03-08T15:39:05ZTTPS: T1490, T1059, T1107, T1491, T1112, T1012, T1082,...

Read MoreRead more about Malware Analysis – chaos – b431bf2649aee55b729f1668a7bc4b12
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 9f8de64b1ae31558a70d0915c545064b

March 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: 9f8de64b1ae31558a70d0915c545064bSHA1: 17f748ecd0c5badc7a8da0025ce1d6b394ce60dbANALYSIS DATE: 2023-03-08T16:15:25ZTTPS: T1005, T1081, T1082, T1222, T1012,...

Read MoreRead more about Malware Analysis – djvu – 9f8de64b1ae31558a70d0915c545064b
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – b3503a8c59408ce1ae5e2f00931ff9df

March 8, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, family:vidar, backdoor, discovery, persistence, ransomware, stealer, trojan, vmprotectMD5: b3503a8c59408ce1ae5e2f00931ff9dfSHA1: 2e8d5546ce7d1f9a645fb7fdca7de1b98c0b00b8ANALYSIS DATE: 2023-03-08T16:31:46ZTTPS: T1060,...

Read MoreRead more about Malware Analysis – amadey – b3503a8c59408ce1ae5e2f00931ff9df
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – baabd73bcc36410b8ac2c583256daea4

March 8, 2023

Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, evasion, exploit, ransomware, spyware, stealer, trojan, upxMD5: baabd73bcc36410b8ac2c583256daea4SHA1: 8cff0fd52aea3e2f4f1e0613a6a37b9c7efa88fbANALYSIS DATE: 2023-03-08T16:31:39ZTTPS: T1005, T1081, T1082, T1031,...

Read MoreRead more about Malware Analysis – discovery – baabd73bcc36410b8ac2c583256daea4
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – f87d7f832564c394452812cea1e4329a

March 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: f87d7f832564c394452812cea1e4329aSHA1: b3d889c87a05799fc1f40b70799a15470712d589ANALYSIS DATE: 2023-03-08T16:23:18ZTTPS: T1012, T1082, T1053, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – f87d7f832564c394452812cea1e4329a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 012cb286ce81b404dc70c71a82269f9d

March 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: 012cb286ce81b404dc70c71a82269f9dSHA1: 50433747e0eab4fcd9c9ae59b2b60b4174ab2a62ANALYSIS DATE: 2023-03-08T16:16:13ZTTPS: T1005, T1081, T1012, T1082, T1060,...

Read MoreRead more about Malware Analysis – djvu – 012cb286ce81b404dc70c71a82269f9d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – cc08259751fc626dc85ab53850673c6e

March 8, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, family:vidar, backdoor, discovery, persistence, ransomware, stealer, trojan, vmprotectMD5: cc08259751fc626dc85ab53850673c6eSHA1: 3a78667441f736103b69433b8af21a739c17a460ANALYSIS DATE: 2023-03-08T17:03:09ZTTPS: T1012,...

Read MoreRead more about Malware Analysis – amadey – cc08259751fc626dc85ab53850673c6e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – b80fb8f1c0bb9b4e8d08ab130ab9071e

March 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: b80fb8f1c0bb9b4e8d08ab130ab9071eSHA1: 4b1a28730a1a2224a37ab641f80b1b53ac1f4240ANALYSIS DATE: 2023-03-08T16:46:14ZTTPS: T1012, T1082, T1005, T1081, T1222,...

Read MoreRead more about Malware Analysis – djvu – b80fb8f1c0bb9b4e8d08ab130ab9071e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – banker – 05279abec80ac228b807f4eb1c0e5a2c

March 8, 2023

Score: 8 MALWARE FAMILY: bankerTAGS:banker, evasion, ransomwareMD5: 05279abec80ac228b807f4eb1c0e5a2cSHA1: 2ceb03e65b935b599e56f7a5dacd8045633e115aANALYSIS DATE: 2023-03-08T17:20:36ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – banker – 05279abec80ac228b807f4eb1c0e5a2c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 13e3a0ef1cb2de40b1c4473a2dd07679

March 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: 13e3a0ef1cb2de40b1c4473a2dd07679SHA1: c27be7a6c9183de9a308a70ac44d6092053b1d66ANALYSIS DATE: 2023-03-08T16:44:49ZTTPS: T1060, T1112, T1222, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – 13e3a0ef1cb2de40b1c4473a2dd07679
cyber-security-1805632_1280
  • News

Why Healthcare Can’t Afford to Ignore Digital Identity

March 8, 2023

Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis, CEO...

Read MoreRead more about Why Healthcare Can’t Afford to Ignore Digital Identity
da9ce3f70cf54a023cf8f86e42f62214b3c4153cc52ea5f6f1ece4c000d1dda7
  • News

Lazarus Group Exploits Zero-Day Vulnerability to Hack South Korean Financial Entity

March 8, 2023

The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business entity...

Read MoreRead more about Lazarus Group Exploits Zero-Day Vulnerability to Hack South Korean Financial Entity
Jenkins
  • News

Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks

March 8, 2023

A pair of severe security vulnerabilities have been disclosed in the Jenkins open source automation server that could lead to...

Read MoreRead more about Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks
cyber
  • News

CISA’s KEV Catalog Updated with 3 New Flaws Threatening IT Management Systems

March 8, 2023

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog,...

Read MoreRead more about CISA’s KEV Catalog Updated with 3 New Flaws Threatening IT Management Systems
featured
  • News

Syxsense Platform: Unified Security and Endpoint Management

March 8, 2023

As threats grow and attack surfaces get more complex, companies continue to struggle with the multitude of tools they utilize...

Read MoreRead more about Syxsense Platform: Unified Security and Endpoint Management
1aeb69fb99d87a3cab25972a18ce194b42d9b4d7a98da1b359ef407c1e63006a
  • News

Sharp Panda Using New Soul Framework Version to Target Southeast Asian Governments

March 8, 2023

High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a Chinese threat actor...

Read MoreRead more about Sharp Panda Using New Soul Framework Version to Target Southeast Asian Governments
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – fd9ec571c9317b69d96d3ef09fc3b722

March 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, discovery, persistence, ransomware, spyware, stealerMD5: fd9ec571c9317b69d96d3ef09fc3b722SHA1: 62950112b396b6299fb1e7fb3bb2bba5cf5f64b5ANALYSIS DATE: 2023-03-08T10:11:38ZTTPS: T1005, T1081, T1012, T1082, T1060,...

Read MoreRead more about Malware Analysis – djvu – fd9ec571c9317b69d96d3ef09fc3b722
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – cb8e4278d5baa134718728a057f7076b

March 8, 2023

Score: 8 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: cb8e4278d5baa134718728a057f7076bSHA1: ef3247d324af56d5254d6d1bebc84d0223da2b4aANALYSIS DATE: 2023-03-08T10:24:51ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – cb8e4278d5baa134718728a057f7076b
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 2cfcb21bd5b1513337f74222240a83e9

March 8, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomwareMD5: 2cfcb21bd5b1513337f74222240a83e9SHA1: c64a12aab3c9192d1969762c4d97dfe6947bebfaANALYSIS DATE: 2023-03-08T10:25:44ZTTPS: T1222, T1060, T1112, T1082, T1053 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – djvu – 2cfcb21bd5b1513337f74222240a83e9
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – cf4c9cd6e648b12c80bf947c77be8f89

March 8, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:smokeloader, family:vidar, backdoor, discovery, evasion, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: cf4c9cd6e648b12c80bf947c77be8f89SHA1: 1683c6778019a0269a430a40fa26872a484df307ANALYSIS DATE:...

Read MoreRead more about Malware Analysis – amadey – cf4c9cd6e648b12c80bf947c77be8f89
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – f4b08f9f07a4938b83f1564b1c21cf27

March 8, 2023

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: f4b08f9f07a4938b83f1564b1c21cf27SHA1: 7ac9dd5a0f7464836ae4b001c2774bb5eb352b5aANALYSIS DATE: 2023-03-08T10:26:12ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – f4b08f9f07a4938b83f1564b1c21cf27

Posts pagination

Previous 1 … 2,702 2,703 2,704 2,705 2,706 2,707 2,708 … 4,410 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]43[.]37[.]134:4434

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 119[.]29[.]231[.]118:443

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 39[.]101[.]74[.]162:443

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]218[.]112[.]112:8880

September 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]109[.]48[.]57:443

September 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel