Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025
unlock_membership
  • Premium Members Content

Secure by Design A Practical Guide to Supply Chain Security for Modern Businesses

August 29, 2025
unlock_membership
  • Premium Members Content

Endpoint Protection Reimagined for Modern Enterprises

August 27, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 0e2f34900a7e0324b91ca191fd043e74

January 4, 2023

Score: 5 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: 0e2f34900a7e0324b91ca191fd043e74SHA1: 8d34aca2b2ca50d3816b161493ec7440f2cbdbc0ANALYSIS DATE: 2023-01-04T10:53:29ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – 0e2f34900a7e0324b91ca191fd043e74
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – a4b4e507ef0dc6c624c17badb10d29c9

January 4, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: a4b4e507ef0dc6c624c17badb10d29c9SHA1: d376a5af805dd6654af35f42f71a3303ff1905f6ANALYSIS DATE: 2023-01-04T10:20:49ZTTPS: T1082, T1012, T1053, T1222,...

Read MoreRead more about Malware Analysis – djvu – a4b4e507ef0dc6c624c17badb10d29c9
CVE-prog
  • Vulnerabilities

Qualcomm BIOS buffer overflow | CVE-2022-40517

January 4, 2023

NAME Qualcomm BIOS buffer overflow Platforms Affected:Qualcomm BIOSRisk Level:8.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Qualcomm BIOS is vulnerable to a stack-based buffer overflow,...

Read MoreRead more about Qualcomm BIOS buffer overflow | CVE-2022-40517
CVE-prog
  • Vulnerabilities

memos security bypass | CVE-2022-4863

January 4, 2023

NAME memos security bypass Platforms Affected:memos memos 0.9.0Risk Level:8.4Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION memos could allow a local attacker to bypass security...

Read MoreRead more about memos security bypass | CVE-2022-4863
CVE-prog
  • Vulnerabilities

Synology VPN Plus Server command execution | CVE-2022-43931

January 4, 2023

NAME Synology VPN Plus Server command execution Platforms Affected:Synology VPN Plus Server for SRM 1.2 Synology VPN Plus Server for...

Read MoreRead more about Synology VPN Plus Server command execution | CVE-2022-43931
CVE-prog
  • Vulnerabilities

Esri Portal for ArcGIS directory traversal | CVE-2022-38205

January 4, 2023

NAME Esri Portal for ArcGIS directory traversal Platforms Affected:Esri Portal for ArcGIS 10.9.1Risk Level:8.6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION Esri Portal for ArcGIS...

Read MoreRead more about Esri Portal for ArcGIS directory traversal | CVE-2022-38205
CVE-prog
  • Vulnerabilities

Apache Kylin command execution | CVE-2022-43396

January 4, 2023

NAME Apache Kylin command execution Platforms Affected:Apache Kylin 3.0.0 Apache Kylin 2.0.0 Apache Kylin 4.0.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Apache Kylin...

Read MoreRead more about Apache Kylin command execution | CVE-2022-43396
CVE-prog
  • Vulnerabilities

memos cross-site request forgery | CVE-2022-4847

January 4, 2023

NAME memos cross-site request forgery Platforms Affected:Risk Level:8.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION memos is vulnerable to cross-site request forgery, caused...

Read MoreRead more about memos cross-site request forgery | CVE-2022-4847
CVE-prog
  • Vulnerabilities

Apache Kylin command execution | CVE-2022-44621

January 4, 2023

NAME Apache Kylin command execution Platforms Affected:Apache Kylin 3.0.0 Apache Kylin 2.0.0 Apache Kylin 4.0.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Apache Kylin...

Read MoreRead more about Apache Kylin command execution | CVE-2022-44621
CVE-prog
  • Vulnerabilities

Froxlor security bypass | CVE-2022-4868

January 4, 2023

NAME Froxlor security bypass Platforms Affected:Froxlor Froxlor 0.10.38.3Risk Level:8.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Froxlor could allow a remote authenticated attacker to bypass...

Read MoreRead more about Froxlor security bypass | CVE-2022-4868
CVE-prog
  • Vulnerabilities

memos cross-site request forgery | CVE-2022-4848

January 4, 2023

NAME memos cross-site request forgery Platforms Affected:Risk Level:8.6Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION memos is vulnerable to cross-site request forgery, caused...

Read MoreRead more about memos cross-site request forgery | CVE-2022-4848
CVE-prog
  • Vulnerabilities

Qualcomm BIOS buffer overflow | CVE-2022-40516

January 4, 2023

NAME Qualcomm BIOS buffer overflow Platforms Affected:Qualcomm BIOSRisk Level:8.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Qualcomm BIOS is vulnerable to a stack-based buffer overflow,...

Read MoreRead more about Qualcomm BIOS buffer overflow | CVE-2022-40516
CVE-prog
  • Vulnerabilities

Qualcomm BIOS buffer overflow | CVE-2022-40520

January 4, 2023

NAME Qualcomm BIOS buffer overflow Platforms Affected:Qualcomm BIOSRisk Level:8.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Qualcomm BIOS is vulnerable to a stack-based buffer overflow,...

Read MoreRead more about Qualcomm BIOS buffer overflow | CVE-2022-40520
trend-3
  • Vulnerabilities

Daily Vulnerability Trends: Wed Jan 04 2023

January 4, 2023

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-41040Microsoft Exchange Server Elevation of Privilege Vulnerability.CVE-2022-29455DOM-based Reflected Cross-Site Scripting (XSS) vulnerability...

Read MoreRead more about Daily Vulnerability Trends: Wed Jan 04 2023
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 4d50334081024a62178c18193ad7640a

January 4, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 4d50334081024a62178c18193ad7640aSHA1: 89f06b69f0acf9f1e625c5097b82b74c20030c8bANALYSIS DATE: 2023-01-04T03:04:12ZTTPS: T1005, T1081, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – 4d50334081024a62178c18193ad7640a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – a83bee74074204ce9dd5e9780187aa0f

January 4, 2023

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: a83bee74074204ce9dd5e9780187aa0fSHA1: f80dca4216a824bdaea42ea1ce115ac8f66c05dbANALYSIS DATE: 2023-01-04T03:11:03ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – a83bee74074204ce9dd5e9780187aa0f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 4b95b42cac7a11602b26caa41574d764

January 4, 2023

Score: 8 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 4b95b42cac7a11602b26caa41574d764SHA1: f64b7f29ecf8516d9d55bca8443f33d041b2b16aANALYSIS DATE: 2023-01-04T03:28:40ZTTPS: T1005, T1081 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – ransomware – 4b95b42cac7a11602b26caa41574d764
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – cebed8210feb0d37479d62199049e0ba

January 4, 2023

Score: 7 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: cebed8210feb0d37479d62199049e0baSHA1: eec586742f917b65c73d2f99c11dd65072c4f298ANALYSIS DATE: 2023-01-04T03:41:58ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – cebed8210feb0d37479d62199049e0ba
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – meow – 80637ef09441d910ae7bdda488eb9989

January 4, 2023

Score: 10 MALWARE FAMILY: meowTAGS:family:meow, ransomware, spyware, stealerMD5: 80637ef09441d910ae7bdda488eb9989SHA1: 638e3ca8c66e218a3bdc666d52c2a91a116b60d7ANALYSIS DATE: 2023-01-04T03:36:27ZTTPS: T1005, T1081 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – meow – 80637ef09441d910ae7bdda488eb9989
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 03a2ae7e3d0fabcf4858e10a822d9a99

January 4, 2023

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:dcrat, family:djvu, family:smokeloader, family:vidar, botnet:19, backdoor, collection, discovery, infostealer, persistence, ransomware, rat, spyware, stealer, trojan,...

Read MoreRead more about Malware Analysis – amadey – 03a2ae7e3d0fabcf4858e10a822d9a99
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 2fd0cc05f8b64718dc4d894e14a0e8d1

January 4, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 2fd0cc05f8b64718dc4d894e14a0e8d1SHA1: c9fae77309397f25dfdb9bf3b3515494f061b8ecANALYSIS DATE: 2023-01-04T04:37:04ZTTPS: T1222, T1053, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 2fd0cc05f8b64718dc4d894e14a0e8d1
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 943d8bacdfa116ec3a2e87fe7c8d8e63

January 4, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 943d8bacdfa116ec3a2e87fe7c8d8e63SHA1: 6fa3d75154f39ffed44291a9f1d6b12760cb5454ANALYSIS DATE: 2023-01-04T05:32:12ZTTPS: T1012, T1082, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 943d8bacdfa116ec3a2e87fe7c8d8e63
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 0c5cbe64b5cc615c77b6d2676300495e

January 4, 2023

Score: 7 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: 0c5cbe64b5cc615c77b6d2676300495eSHA1: 58aef51084d93563d9b4081c1b51acdb7745e931ANALYSIS DATE: 2023-01-04T04:19:32ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – 0c5cbe64b5cc615c77b6d2676300495e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 54e06155a4b0a099b9fe1ddc9f209329

January 4, 2023

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:19, discovery, persistence, ransomware, spyware, stealerMD5: 54e06155a4b0a099b9fe1ddc9f209329SHA1: 48b0ad39a74137e45a0d93cc5b339847b88d971cANALYSIS DATE: 2023-01-04T05:50:25ZTTPS: T1060, T1112, T1053, T1222,...

Read MoreRead more about Malware Analysis – djvu – 54e06155a4b0a099b9fe1ddc9f209329

Posts pagination

Previous 1 … 2,873 2,874 2,875 2,876 2,877 2,878 2,879 … 4,404 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • News

Plex Data Breach Security Incident: What Happened and What You Need to Do

September 9, 2025
DFIR_feature_image
  • Malware Analysis

Blurring The Lines: Intrusion Shows Connection With Three Major Ransomware Gangs

September 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10115 – n/a – SiempreCMS

September 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10113 – itsourcecode – Student Information Management System

September 9, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10112 – itsourcecode – Student Information Management System

September 9, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel