Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 4bb5c0ed18f4b7ae33ba272eae17abf2

November 3, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, botnet:google2, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: 4bb5c0ed18f4b7ae33ba272eae17abf2SHA1: e0e02b31d3ad2e965d223ebe3451bd9c9e0385faANALYSIS...

Read MoreRead more about Malware Analysis – djvu – 4bb5c0ed18f4b7ae33ba272eae17abf2
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – db2c67c513d5bd1edde683e770c77790

November 3, 2022

Score: 5 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: db2c67c513d5bd1edde683e770c77790SHA1: c7a84b667aacd4b220bacb160c2e990f6bced4baANALYSIS DATE: 2022-11-03T11:38:37ZTTPS: T1491, T1112, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or...

Read MoreRead more about Malware Analysis – ransomware – db2c67c513d5bd1edde683e770c77790
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – e043f277d99b653243078d318e063b46

November 3, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: e043f277d99b653243078d318e063b46SHA1: baad7c939debbfd879c7c0f62f496ec6dddedd37ANALYSIS DATE:...

Read MoreRead more about Malware Analysis – djvu – e043f277d99b653243078d318e063b46
osint
  • News

Updated TikTok Privacy Policy confirms that Chinese staff can access European users’ data

November 3, 2022

TikTok updated its privacy policy for European Economic Area (“EEA”) and confirmed that its Chinese staff can access their users’ data....

Read MoreRead more about Updated TikTok Privacy Policy confirms that Chinese staff can access European users’ data
CVE-prog
  • Vulnerabilities

Fortinet FortiADC cross-site scripting | CVE-2022-35851

November 3, 2022

NAME Fortinet FortiADC cross-site scripting Platforms Affected:Fortinet FortiADC 7.1.0Risk Level:8Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION Fortinet FortiADC is vulnerable to cross-site scripting, caused...

Read MoreRead more about Fortinet FortiADC cross-site scripting | CVE-2022-35851
CVE-prog
  • Vulnerabilities

Fortinet FortiAnalyzer and Fortinet FortiManager cross-site scripting | CVE-2022-39950

November 3, 2022

NAME Fortinet FortiAnalyzer and Fortinet FortiManager cross-site scripting Platforms Affected:Risk Level:8Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION Fortinet FortiAnalyzer and Fortinet FortiManager are vulnerable...

Read MoreRead more about Fortinet FortiAnalyzer and Fortinet FortiManager cross-site scripting | CVE-2022-39950
CVE-prog
  • Vulnerabilities

IP-COM EW9 command execution | CVE-2022-43367

November 3, 2022

NAME IP-COM EW9 command execution Platforms Affected:Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION IP-COM EW9 could allow a remote attacker to execute arbitrary...

Read MoreRead more about IP-COM EW9 command execution | CVE-2022-43367
CVE-prog
  • Vulnerabilities

XenSource Xen Xenstore privilege escalation | CVE-2022-42320

November 3, 2022

NAME XenSource Xen Xenstore privilege escalation Platforms Affected:XenSource XenRisk Level:8.4Exploitability:UnprovenConsequences:Gain Privilege DESCRIPTION XenSource Xen could allow a local attacker to...

Read MoreRead more about XenSource Xen Xenstore privilege escalation | CVE-2022-42320
CVE-prog
  • Vulnerabilities

Sanitization Management System SQL injection | CVE-2022-43355

November 3, 2022

NAME Sanitization Management System SQL injection Platforms Affected:Risk Level:7.2Exploitability:HighConsequences:Data Manipulation DESCRIPTION Sanitization Management System is vulnerable to SQL injection. A...

Read MoreRead more about Sanitization Management System SQL injection | CVE-2022-43355
CVE-prog
  • Vulnerabilities

Fortinet FortiADC cross-site scripting | CVE-2022-38374

November 3, 2022

NAME Fortinet FortiADC cross-site scripting Platforms Affected:Fortinet FortiADC 6.2.0 Fortinet FortiADC 7.0.2 Fortinet FortiADC 7.0.0 Fortinet FortiADC 6.2.4Risk Level:8.8Exploitability:HighConsequences:Cross-Site Scripting...

Read MoreRead more about Fortinet FortiADC cross-site scripting | CVE-2022-38374
osint
  • News

Fortinet fixed 16 vulnerabilities, 6 rated as high severity

November 3, 2022

Fortinet addressed 16 vulnerabilities in some of the company’s products, six flaws received a ‘high’ severity rate. One of the...

Read MoreRead more about Fortinet fixed 16 vulnerabilities, 6 rated as high severity
trend-2
  • Vulnerabilities

Daily Vulnerability Trends: Thu Nov 03 2022

November 3, 2022

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-22241An Improper Input Validation vulnerability in the J-Web component of Juniper Networks...

Read MoreRead more about Daily Vulnerability Trends: Thu Nov 03 2022
abstract-security-alert-990x400-1
  • News

Server-side attacks, C&C in public clouds and other MDR cases we observed

November 3, 2022

Introduction This report describes several interesting incidents observed by the Kaspersky Managed Detection and Response (MDR) team. The goal of the...

Read MoreRead more about Server-side attacks, C&C in public clouds and other MDR cases we observed
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – 58088f35c31731e82afdc9157e1418c8

November 3, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, ransomware, wormMD5: 58088f35c31731e82afdc9157e1418c8SHA1: fc6fc4739db9e837618ec5d5047cc1a8d5d4a57eANALYSIS DATE: 2022-11-03T03:00:25ZTTPS: T1046 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – wannacry – 58088f35c31731e82afdc9157e1418c8
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – bd8f00d5443c21442f9e9ee7dc656504

November 3, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, botnet:mario23_10, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: bd8f00d5443c21442f9e9ee7dc656504SHA1: 87335c5e32b8a6609e5e53e50ee47c2167f21f37ANALYSIS...

Read MoreRead more about Malware Analysis – djvu – bd8f00d5443c21442f9e9ee7dc656504
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 432c4e1f72cb160beceac60a75add7fc

November 3, 2022

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:redline, family:smokeloader, botnet:mario23_10, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: 432c4e1f72cb160beceac60a75add7fcSHA1:...

Read MoreRead more about Malware Analysis – amadey – 432c4e1f72cb160beceac60a75add7fc
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – e28c92d67de5b0e50656cd64bc43d609

November 3, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: e28c92d67de5b0e50656cd64bc43d609SHA1: ae111a18223d9c9b84b3d46b58b383edd17b7d78ANALYSIS DATE: 2022-11-03T03:31:45ZTTPS: T1222, T1005, T1081, T1012, T1082, T1060,...

Read MoreRead more about Malware Analysis – djvu – e28c92d67de5b0e50656cd64bc43d609
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 0f3a951d4b9f1c2717429eb512b6a35f

November 3, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, botnet:mario23_10, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: 0f3a951d4b9f1c2717429eb512b6a35fSHA1: de70f63ab89c1eaace1e8ba295883853bbf40168ANALYSIS...

Read MoreRead more about Malware Analysis – djvu – 0f3a951d4b9f1c2717429eb512b6a35f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 7940034ef696a5864e8987d5831f5982

November 3, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: 7940034ef696a5864e8987d5831f5982SHA1: c2341db13c0d705c8f6b0c0096a45f112bafe92bANALYSIS DATE: 2022-11-03T05:40:38ZTTPS: T1012, T1082, T1005, T1081, T1222, T1053,...

Read MoreRead more about Malware Analysis – djvu – 7940034ef696a5864e8987d5831f5982
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 7d281af034cbaaf29f1c7683d83b0816

November 3, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: 7d281af034cbaaf29f1c7683d83b0816SHA1: 8ef1c438915f07f323243011c849169666111642ANALYSIS DATE: 2022-11-03T05:00:41ZTTPS: T1082, T1053, T1005, T1081, T1012, T1222,...

Read MoreRead more about Malware Analysis – djvu – 7d281af034cbaaf29f1c7683d83b0816
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 60be5c9c87907487fe1314ccaa7a5779

November 3, 2022

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:redline, family:smokeloader, botnet:google2, botnet:mario23_10, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: 60be5c9c87907487fe1314ccaa7a5779SHA1:...

Read MoreRead more about Malware Analysis – amadey – 60be5c9c87907487fe1314ccaa7a5779
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 192[.]3[.]153[.]207:808

November 3, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 192[.]3[.]153[.]207:808
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 23[.]227[.]198[.]232:443

November 3, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 23[.]227[.]198[.]232:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 164[.]92[.]190[.]196:443

November 3, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 164[.]92[.]190[.]196:443

Posts pagination

Previous 1 … 2,757 2,758 2,759 2,760 2,761 2,762 2,763 … 4,066 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2024-13793

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-3419

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-32873

May 10, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4127

May 10, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 150[.]158[.]108[.]220:443

May 10, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel