Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – af5eb1234bcc794162c9f0f2fb4122be

February 1, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: af5eb1234bcc794162c9f0f2fb4122beSHA1: 0fea89cae611ed713452e6588faadf2cc6226e87ANALYSIS DATE: 2023-02-01T17:09:30ZTTPS: T1053, T1005, T1081, T1012,...

Read MoreRead more about Malware Analysis – djvu – af5eb1234bcc794162c9f0f2fb4122be
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – e401a15ea8319f97d7c841b36a7d360a

February 1, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, family:vidar, botnet:19, botnet:@2023@new, backdoor, discovery, infostealer, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: e401a15ea8319f97d7c841b36a7d360aSHA1:...

Read MoreRead more about Malware Analysis – djvu – e401a15ea8319f97d7c841b36a7d360a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 0f35d14f2fd868c2235e2ef87a341a77

February 1, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 0f35d14f2fd868c2235e2ef87a341a77SHA1: 7913ad5f3754c46b2a510e2973093cd289fc3ea9ANALYSIS DATE: 2023-02-01T16:44:26ZTTPS: T1005, T1081, T1060, T1112,...

Read MoreRead more about Malware Analysis – djvu – 0f35d14f2fd868c2235e2ef87a341a77
image-2
  • Data Breach
  • Ransomware

Royal Ransomware Victim: TK Elevator

February 1, 2023

RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...

Read MoreRead more about Royal Ransomware Victim: TK Elevator
vice-ransomware
  • Data Breach
  • Ransomware

Vice Society Ransomware Victim: Guildford County School

February 1, 2023

Vice Society Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about Vice Society Ransomware Victim: Guildford County School
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 51[.]254[.]53[.]1:80

February 1, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 51[.]254[.]53[.]1:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 81[.]68[.]173[.]143:80

February 1, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 81[.]68[.]173[.]143:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 104[.]208[.]73[.]11:443

February 1, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 104[.]208[.]73[.]11:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 45[.]61[.]186[.]121:80

February 1, 2023

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 45[.]61[.]186[.]121:80
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 5b82951e130e62cdd1ffe83c173c5577

February 1, 2023

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 5b82951e130e62cdd1ffe83c173c5577SHA1: ea6d9f216a48d4d11ebb9026d225ba3a48cda3eeANALYSIS DATE: 2023-02-01T09:33:03ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 5b82951e130e62cdd1ffe83c173c5577
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – a237e7d2a7113dc1ed04f60cccbf77e6

February 1, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: a237e7d2a7113dc1ed04f60cccbf77e6SHA1: 4e629739c773855aa15d702ea789809598844827ANALYSIS DATE: 2023-02-01T10:08:17ZTTPS: T1082, T1005, T1081, T1012,...

Read MoreRead more about Malware Analysis – djvu – a237e7d2a7113dc1ed04f60cccbf77e6
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 35b59455f922242f7eb712b8a59d09e3

February 1, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:smokeloader, family:vidar, botnet:19, backdoor, discovery, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: 35b59455f922242f7eb712b8a59d09e3SHA1: 56e0003a00e6f0d2f61a9624e5b21f517bae6c4dANALYSIS DATE: 2023-02-01T10:40:04ZTTPS:...

Read MoreRead more about Malware Analysis – djvu – 35b59455f922242f7eb712b8a59d09e3
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – d9f343ef3d19bcb2d9cf34a026475f6f

February 1, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:smokeloader, family:vidar, botnet:19, backdoor, discovery, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: d9f343ef3d19bcb2d9cf34a026475f6fSHA1: d40edeccf97e8c623be22e282418c507a2d202c5ANALYSIS DATE: 2023-02-01T11:39:00ZTTPS:...

Read MoreRead more about Malware Analysis – djvu – d9f343ef3d19bcb2d9cf34a026475f6f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 87fdb817f23819d66aa76611694525cf

February 1, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 87fdb817f23819d66aa76611694525cfSHA1: 4b4d231ba899be8a4973a96fe86cd34bd79dd05fANALYSIS DATE: 2023-02-01T10:35:26ZTTPS: T1005, T1081, T1222, T1082,...

Read MoreRead more about Malware Analysis – djvu – 87fdb817f23819d66aa76611694525cf
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – 6ba5c46261ff52e7438f21ccef5f8c7e

February 1, 2023

Score: 8 MALWARE FAMILY: discoveryTAGS:discovery, exploitMD5: 6ba5c46261ff52e7438f21ccef5f8c7eSHA1: acdf309fbfebecb7a93b78068fc1498fae4d9e62ANALYSIS DATE: 2023-02-01T11:38:44ZTTPS: T1222, T1158 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or...

Read MoreRead more about Malware Analysis – discovery – 6ba5c46261ff52e7438f21ccef5f8c7e
CVE-prog
  • Vulnerabilities

BaiCells Nova 227, Nova 233, Nova 243, and Nova 246 LTE TDD eNodeB devices code execution | CVE-2023-24508

February 1, 2023

NAME__________BaiCells Nova 227, Nova 233, Nova 243, and Nova 246 LTE TDD eNodeB devices code executionPlatforms Affected:BaiCells Nova 246 RTS/RTD...

Read MoreRead more about BaiCells Nova 227, Nova 233, Nova 243, and Nova 246 LTE TDD eNodeB devices code execution | CVE-2023-24508
CVE-prog
  • Vulnerabilities

Apache Linkis code execution | CVE-2022-44645

February 1, 2023

NAME__________Apache Linkis code executionPlatforms Affected:Apache Linkis 1.3.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Apache Linkis could allow a remote authenticated attacker to execute arbitrary...

Read MoreRead more about Apache Linkis code execution | CVE-2022-44645
CVE-prog
  • Vulnerabilities

FreshTomato command execution | CVE-2022-42484

February 1, 2023

NAME__________FreshTomato command executionPlatforms Affected:FreshTomato FreshTomato 2022.5Risk Level:9.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________FreshTomato could allow a remote authenticated attacker to execute arbitrary commands on...

Read MoreRead more about FreshTomato command execution | CVE-2022-42484
CVE-prog
  • Vulnerabilities

ChangingTech MegaServiSignAdapter code execution | CVE-2022-39060

February 1, 2023

NAME__________ChangingTech MegaServiSignAdapter code executionPlatforms Affected:ChangingTech MegaServiSignAdapter 1.0.17.0823Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ChangingTech MegaServiSignAdapter could allow a remote attacker to execute arbitrary code...

Read MoreRead more about ChangingTech MegaServiSignAdapter code execution | CVE-2022-39060
CVE-prog
  • Vulnerabilities

ContentStudio Plugin for WordPress security bypass | CVE-2023-0558

February 1, 2023

NAME__________ContentStudio Plugin for WordPress security bypassPlatforms Affected:WordPress ContentStudio Plugin for WordPress 1.2.5Risk Level:8.2Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________ContentStudio Plugin for WordPress could allow...

Read MoreRead more about ContentStudio Plugin for WordPress security bypass | CVE-2023-0558
CVE-prog
  • Vulnerabilities

Apache Portable Runtime (APR) integer overflow | CVE-2022-25147

February 1, 2023

NAME__________Apache Portable Runtime (APR) integer overflowPlatforms Affected:Apache Portable Runtime 1.6.1Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Apache Portable Runtime (APR) could allow a remote...

Read MoreRead more about Apache Portable Runtime (APR) integer overflow | CVE-2022-25147
CVE-prog
  • Vulnerabilities

Apache Portable Runtime (APR) integer overflow | CVE-2022-24963

February 1, 2023

NAME__________Apache Portable Runtime (APR) integer overflowPlatforms Affected:Apache Portable Runtime 1.7.0Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Apache Portable Runtime (APR) could allow a remote...

Read MoreRead more about Apache Portable Runtime (APR) integer overflow | CVE-2022-24963
CVE-prog
  • Vulnerabilities

EFence SQL injection | CVE-2023-22900

February 1, 2023

NAME__________EFence SQL injectionPlatforms Affected:Risk Level:9.8Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION__________EFence is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements...

Read MoreRead more about EFence SQL injection | CVE-2023-22900
CVE-prog
  • Vulnerabilities

Apache Portable Runtime (APR) integer overflow | CVE-2022-28331

February 1, 2023

NAME__________Apache Portable Runtime (APR) integer overflowPlatforms Affected:Apache Portable Runtime 1.7.0Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Apache Portable Runtime (APR) could allow a remote...

Read MoreRead more about Apache Portable Runtime (APR) integer overflow | CVE-2022-28331

Posts pagination

Previous 1 … 2,816 2,817 2,818 2,819 2,820 2,821 2,822 … 4,409 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5086 – Dassault Systèmes – DELMIA Apriso

September 11, 2025
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: stored-xss-on-tiktok-s-backend-leads-to-the-leakage-of-highly-sensitive-administrator-data-cookies-api-keys-internal-paths-emails-phone-numbers-ahmed-xyz

September 11, 2025
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: toctou-race-condition-in-http-connection-reuse-leads-to-certificate-validation-bypass–xrey

September 11, 2025
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: chained-broken-access-control-in-tiktok-live-backstage-enables-full-control-of-public-leaderboard-activities-eneri

September 11, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9018 – germanpearls – Time Tracker

September 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel