Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Endpoint Protection Reimagined for Modern Enterprises

August 27, 2025
unlock_membership
  • Premium Members Content

Privacy by Design A Practical Guide to Data Protection in a Connected World

August 25, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 6769f8ded9254765a851e0987753f357

December 2, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 6769f8ded9254765a851e0987753f357SHA1: 83f84ee62729844ef206d2cf0d7a18fe20fa5ff9ANALYSIS DATE: 2022-12-02T16:15:15ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 6769f8ded9254765a851e0987753f357
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – b276c03b6fd8df69964c5d4e687881d1

December 2, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, stealerMD5: b276c03b6fd8df69964c5d4e687881d1SHA1: 7c4be72dc54658bdb49bec08bcb974510ce2af63ANALYSIS DATE: 2022-12-02T16:24:00ZTTPS: T1060, T1112, T1222, T1082, T1012...

Read MoreRead more about Malware Analysis – djvu – b276c03b6fd8df69964c5d4e687881d1
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – play – 0f8ad126812dc650f26b5739590b8ab8

December 2, 2022

Score: 10 MALWARE FAMILY: playTAGS:family:play, ransomwareMD5: 0f8ad126812dc650f26b5739590b8ab8SHA1: bae22642918dafe12bb7318d7e56c995158f4b63ANALYSIS DATE: 2022-12-02T17:39:15ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – play – 0f8ad126812dc650f26b5739590b8ab8
osint
  • News

Cuba Ransomware received over $60M in Ransom payments as of August 2022

December 2, 2022

Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of...

Read MoreRead more about Cuba Ransomware received over $60M in Ransom payments as of August 2022
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: menziesaviation[.]com

December 2, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: menziesaviation[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: ckfinc[.]com

December 2, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: ckfinc[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: st-group[.]com

December 2, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: st-group[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: thorntontomasetti[.]com

December 2, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: thorntontomasetti[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: 8×8[.]com

December 2, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: 8×8[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: smithsinterconnect[.]com

December 2, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: smithsinterconnect[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: hildinganders[.]com

December 2, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: hildinganders[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: adamjeeinsurance[.]com

December 2, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: adamjeeinsurance[.]com
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 515f679afd9c6090bede05e1256cd1ca

December 2, 2022

Score: 7 MALWARE FAMILY: persistenceTAGS:persistence, ransomwareMD5: 515f679afd9c6090bede05e1256cd1caSHA1: 3c5999ee2464a7b9b7f7cee377224504eda0a848ANALYSIS DATE: 2022-11-30T12:22:29ZTTPS: T1060, T1112, T1491, T1012, T1082 ScoreMeaningExample10Known badA malware family was...

Read MoreRead more about Malware Analysis – persistence – 515f679afd9c6090bede05e1256cd1ca
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – fb9fb2ec179b0f7969e02b8c780b2bb9

December 2, 2022

Score: 9 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, trojanMD5: fb9fb2ec179b0f7969e02b8c780b2bb9SHA1: d0fdfba22096d115b30c4872ae3de82ef657ba39ANALYSIS DATE: 2022-11-30T12:19:15ZTTPS: T1060, T1112, T1107, T1490, T1082 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – evasion – fb9fb2ec179b0f7969e02b8c780b2bb9
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – fa3b6e257e61791990eb3c99a597ac37

December 2, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, ransomware, wormMD5: fa3b6e257e61791990eb3c99a597ac37SHA1: c1c1fc66810fa18f44c56af4c581b1b6d4b5e1f1ANALYSIS DATE: 2022-11-30T12:21:56ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – wannacry – fa3b6e257e61791990eb3c99a597ac37
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – c2b3f51728001fbaaa5a73fcaf3e1a68

December 2, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, ransomware, wormMD5: c2b3f51728001fbaaa5a73fcaf3e1a68SHA1: 38b9d3880194558f17b9fa03b22d43b66691b82aANALYSIS DATE: 2022-11-30T12:26:05ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – wannacry – c2b3f51728001fbaaa5a73fcaf3e1a68
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – 5265fc3146b7e3922c79ef463aaecd16

December 2, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, ransomware, wormMD5: 5265fc3146b7e3922c79ef463aaecd16SHA1: bc06658291907ae47eadd970e8f796a39868d7fbANALYSIS DATE: 2022-11-30T12:24:30ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – wannacry – 5265fc3146b7e3922c79ef463aaecd16
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – 4f53357da304a79b6cb55fd8de9a094c

December 2, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, ransomware, wormMD5: 4f53357da304a79b6cb55fd8de9a094cSHA1: 9c5c47270b57100cb7b3b03684c4f284bca65454ANALYSIS DATE: 2022-11-30T12:26:36ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – wannacry – 4f53357da304a79b6cb55fd8de9a094c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 7f4c4446f9a74e8b3541894a7849433a

December 2, 2022

Score: 7 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: 7f4c4446f9a74e8b3541894a7849433aSHA1: af3bc8601cbecdc1c655018e7f900be7d5aaaddeANALYSIS DATE: 2022-11-30T12:26:58ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – 7f4c4446f9a74e8b3541894a7849433a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – a135677250b0007496c39cb5c876954d

December 2, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, ransomware, wormMD5: a135677250b0007496c39cb5c876954dSHA1: 3d8164d7278a73e58a4f87a617793b5ed80ff467ANALYSIS DATE: 2022-11-30T12:28:40ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – wannacry – a135677250b0007496c39cb5c876954d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – gandcrab – e00bfbb29967b7c6016b8c6f85b4043d

December 2, 2022

Score: 10 MALWARE FAMILY: gandcrabTAGS:family:gandcrab, backdoor, ransomware, spyware, stealerMD5: e00bfbb29967b7c6016b8c6f85b4043dSHA1: 04b75bed55f938df8a6fcab6b6fadb40ae1e4e04ANALYSIS DATE: 2022-11-30T12:32:17ZTTPS: T1012, T1120, T1082, T1005, T1081 ScoreMeaningExample10Known badA...

Read MoreRead more about Malware Analysis – gandcrab – e00bfbb29967b7c6016b8c6f85b4043d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – 835cbba608ad354eeaf5671108d39450

December 2, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, ransomware, wormMD5: 835cbba608ad354eeaf5671108d39450SHA1: d3fa0e70ead6f25317d2ba822a04562422c205b7ANALYSIS DATE: 2022-11-30T12:33:44ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – wannacry – 835cbba608ad354eeaf5671108d39450
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – b9de290ef3ec191950f0550cf6d14a6f

December 2, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, ransomware, wormMD5: b9de290ef3ec191950f0550cf6d14a6fSHA1: 8926858b8703c0a303284ce5d8ae587e42c67324ANALYSIS DATE: 2022-11-30T12:28:36ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – wannacry – b9de290ef3ec191950f0550cf6d14a6f
osint
  • News

Android Keyboard Apps with 2 Million downloads can remotely hack your device

December 2, 2022

Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile...

Read MoreRead more about Android Keyboard Apps with 2 Million downloads can remotely hack your device

Posts pagination

Previous 1 … 2,940 2,941 2,942 2,943 2,944 2,945 2,946 … 4,384 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-8067 – Red Hat – Red Hat Enterprise Linux 10

August 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-13807 – xagio – Xagio SEO – AI Powered SEO

August 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-36003 – IBM – Security Verify Governance Identity Manager

August 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7812 – videowhisper – Video Share VOD – Turnkey Video Site Builder Script

August 28, 2025
306f6a0d865e1ce6c8093b989646f99adedf4094b99db89380853de8dda0e2d4
  • News

Google Takes Photoshop To The Woodshed With New Image Ai

August 28, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel