Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025
unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – cc81f0cdefab1bd25dc1e2ddfe316440

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: cc81f0cdefab1bd25dc1e2ddfe316440SHA1: 4dae9abc021c7011fa364d4749fac76fa9fd38eaANALYSIS DATE: 2022-10-27T10:40:40ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – cc81f0cdefab1bd25dc1e2ddfe316440
phone-mobile-apps
  • NCSC
  • News

Using secure messaging, voice and collaboration apps

October 27, 2022

Using secure messaging, voice and collaboration apps With 'hybrid working' (a combination of working from home and the office) now...

Read MoreRead more about Using secure messaging, voice and collaboration apps
edinburgh-g0fc4f9652_640-Copy
  • NCSC
  • News

Why vulnerabilities are like buses

October 27, 2022

Why vulnerabilities are like buses There's an old saying that you wait ages for a bus, and then several come...

Read MoreRead more about Why vulnerabilities are like buses
BoardMeeting-Copy
  • NCSC
  • News

Log4j vulnerability: what should boards be asking?

October 27, 2022

Log4j vulnerability: what should boards be asking? The Log4Shell critical vulnerability in the widely used logging tool Log4j has caused concern...

Read MoreRead more about Log4j vulnerability: what should boards be asking?
fibre-optic-cables
  • NCSC
  • News

Cyber Security in the Built Environment – considering security throughout a buildings lifecycle

October 27, 2022

Cyber Security in the Built Environment - considering security throughout a buildings lifecycle A building being designed today is, as...

Read MoreRead more about Cyber Security in the Built Environment – considering security throughout a buildings lifecycle
online-transactions
  • NCSC
  • News

‘Transaction monitoring’ & ‘Building and operating a secure online service’ guidance published

October 27, 2022

'Transaction monitoring' & 'Building and operating a secure online service' guidance published If you're responsible for the designing and running...

Read MoreRead more about ‘Transaction monitoring’ & ‘Building and operating a secure online service’ guidance published
technology-assurance-main
  • NCSC
  • News

The Technology Assurance principles

October 27, 2022

The Technology Assurance principles In this blog post I want to introduce a new family of principles, the Technology Assurance...

Read MoreRead more about The Technology Assurance principles
glass-walkway-mountains
  • NCSC
  • News

Zero Trust migration: where do I start?

October 27, 2022

Zero Trust migration: where do I start? Following our ‘Zero Trust: is it right for me?' blog, this second installment...

Read MoreRead more about Zero Trust migration: where do I start?
caf-3.1
  • NCSC
  • News

The Cyber Assessment Framework 3.1

October 27, 2022

The Cyber Assessment Framework 3.1 This latest version of the Cyber Assessment Framework (CAF), 3.1, supports the CAF's core users -...

Read MoreRead more about The Cyber Assessment Framework 3.1
acd_year5
  • NCSC
  • News

ACD the 5th Year: report now available to download

October 27, 2022

ACD the 5th Year: report now available to download The aim of the NCSC's Active Cyber Defence (ACD) programme is...

Read MoreRead more about ACD the 5th Year: report now available to download
key-1798-shop-sign
  • NCSC
  • News

Mythbusting cloud key management services

October 27, 2022

Mythbusting cloud key management services The NCSC’s recently-updated cloud security guidance includes a new section on how to configure and...

Read MoreRead more about Mythbusting cloud key management services
supporting_staff
  • NCSC
  • News

Avoiding crisis mismanagement

October 27, 2022

Avoiding crisis mismanagement Every day, an eclectic range of cyber attacks take place across the UK. No two attacks are...

Read MoreRead more about Avoiding crisis mismanagement
cloud-launch
  • NCSC
  • News

Relaunching the NCSC’s Cloud security guidance collection

October 27, 2022

Relaunching the NCSC's Cloud security guidance collection This week we have launched the updated NCSC’s cloud security guidance. It’s more...

Read MoreRead more about Relaunching the NCSC’s Cloud security guidance collection
soc-101
  • NCSC
  • News

New SOC guidance 101

October 27, 2022

New SOC guidance 101 Security operations centres (or SOCs) are notoriously difficult to design, build and operate. But they're also...

Read MoreRead more about New SOC guidance 101
artificial-intelligence-machine-learning
  • NCSC
  • News

Introducing our new machine learning security principles

October 27, 2022

Introducing our new machine learning security principles Artificial intelligence (AI) and machine learning (ML) systems are increasingly used in every...

Read MoreRead more about Introducing our new machine learning security principles
Cloud-blog
  • NCSC
  • News

The security benefits of modern collaboration in the cloud

October 27, 2022

The security benefits of modern collaboration in the cloud When using cloud services, it is important to balance the need...

Read MoreRead more about The security benefits of modern collaboration in the cloud
protect-brand-shield-hand
  • NCSC
  • News

Protect your customers to protect your brand

October 27, 2022

Protect your customers to protect your brand We're pleased to publish a brace of documents that will help organisations to...

Read MoreRead more about Protect your customers to protect your brand
Supply-chain-security-guidance
  • NCSC
  • News

Supply chain cyber security: new guidance from the NCSC

October 27, 2022

Supply chain cyber security: new guidance from the NCSC Many of us rely on suppliers to deliver products, systems, and...

Read MoreRead more about Supply chain cyber security: new guidance from the NCSC
cloud-grass-hill
  • NCSC
  • News

Securing the cloud (by design *and* by default)

October 27, 2022

Securing the cloud (by design *and* by default) In any conversation about cloud security, it won’t take long before someone...

Read MoreRead more about Securing the cloud (by design *and* by default)
trend-22
  • Vulnerabilities

Daily Vulnerability Trends: Thu Oct 27 2022

October 27, 2022

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-41352An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An...

Read MoreRead more about Daily Vulnerability Trends: Thu Oct 27 2022
osint
  • News

British hacker arraigned for running The Real Deal dark web marketplace

October 27, 2022

A popular British hacker was charged by the U.S. authorities for allegedly running the ‘The Real Deal’ dark web marketplace....

Read MoreRead more about British hacker arraigned for running The Real Deal dark web marketplace
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – e5253585af59f9701f1a788ae87b9e73

October 27, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, ransomware, wormMD5: e5253585af59f9701f1a788ae87b9e73SHA1: e1b192fbbde83210802b354dcef2c37aaa180ee2ANALYSIS DATE: 2022-10-27T02:40:21ZTTPS: T1046 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – wannacry – e5253585af59f9701f1a788ae87b9e73
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – f52a0fd36a878077caa1859e9806d4ec

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: f52a0fd36a878077caa1859e9806d4ecSHA1: 3e6ea7b92af7d1b14731ff301d9222c90f4db5d0ANALYSIS DATE: 2022-10-27T03:00:19ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – f52a0fd36a878077caa1859e9806d4ec
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 5a6ec6e5d23e253236c446cfa5154f7b

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 5a6ec6e5d23e253236c446cfa5154f7bSHA1: 9a9188815add862d081f6f5f18c6de4b08ecb6c7ANALYSIS DATE: 2022-10-27T03:00:26ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 5a6ec6e5d23e253236c446cfa5154f7b

Posts pagination

Previous 1 … 2,930 2,931 2,932 2,933 2,934 2,935 2,936 … 4,207 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: cityofgardendale[.]com

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27452

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27453

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27454

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27455

July 4, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel