Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025
unlock_membership
  • Premium Members Content

Mastering Secure Coding Practices to Protect Your Software

June 27, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 39[.]106[.]45[.]206:8090

October 22, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 39[.]106[.]45[.]206:8090
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 7b449fc14ac4ed33d828d70367dd9361

October 22, 2022

Score: 10 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealer, upxMD5: 7b449fc14ac4ed33d828d70367dd9361SHA1: 44064f97b839e6c421c1b52c9cf2e8395dd2f890ANALYSIS DATE: 2022-10-20T08:28:28ZTTPS: T1060, T1112, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – persistence – 7b449fc14ac4ed33d828d70367dd9361
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – e9364fd6cff3a0fee9d8636f526a506e

October 22, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: e9364fd6cff3a0fee9d8636f526a506eSHA1: e51f1e530d958bf41386b39416413977c4143c6aANALYSIS DATE: 2022-10-21T20:13:21ZTTPS: T1005, T1081, T1012, T1222,...

Read MoreRead more about Malware Analysis – djvu – e9364fd6cff3a0fee9d8636f526a506e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 80164d0ec36a23a99f475bcd6b7d22e0

October 22, 2022

Score: 9 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomwareMD5: 80164d0ec36a23a99f475bcd6b7d22e0SHA1: d49a64aa7b25b3789d06174b8bb82c284d1ddd8bANALYSIS DATE: 2022-10-20T08:29:42ZTTPS: T1490, T1060, T1112 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – evasion – 80164d0ec36a23a99f475bcd6b7d22e0
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – danabot – d6d9a414b730c354bcc0898be39bb1ef

October 22, 2022

Score: 10 MALWARE FAMILY: danabotTAGS:family:danabot, family:djvu, family:smokeloader, family:vidar, botnet:517, backdoor, banker, collection, discovery, persistence, ransomware, spyware, stealer, trojanMD5: d6d9a414b730c354bcc0898be39bb1efSHA1: cb9a900daee7a92e682ffec32555cf9e5da63bb6ANALYSIS...

Read MoreRead more about Malware Analysis – danabot – d6d9a414b730c354bcc0898be39bb1ef
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – danabot – 8ae5a35a6e434514f421e720aecab786

October 22, 2022

Score: 10 MALWARE FAMILY: danabotTAGS:family:danabot, family:djvu, family:smokeloader, family:vidar, botnet:517, backdoor, banker, collection, discovery, persistence, ransomware, spyware, stealer, trojanMD5: 8ae5a35a6e434514f421e720aecab786SHA1: 518ae303c6e50d29ab84765b49e94d9f34862599ANALYSIS...

Read MoreRead more about Malware Analysis – danabot – 8ae5a35a6e434514f421e720aecab786
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 9a5f578e12a5b13f8f43d5354d1a6b3a

October 22, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 9a5f578e12a5b13f8f43d5354d1a6b3aSHA1: 13a54466ea20dd8a3ff8694f19ce54fba416f8b4ANALYSIS DATE: 2022-10-21T21:00:32ZTTPS: T1222, T1082, T1053, T1005,...

Read MoreRead more about Malware Analysis – djvu – 9a5f578e12a5b13f8f43d5354d1a6b3a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – b2215e07bc71e215abc9ed15d8d1092f

October 22, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: b2215e07bc71e215abc9ed15d8d1092fSHA1: 43d13e28914e43885b02231d4d774aac13dfd0a2ANALYSIS DATE: 2022-10-21T21:00:19ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091, T1060, T1112...

Read MoreRead more about Malware Analysis – persistence – b2215e07bc71e215abc9ed15d8d1092f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – c9541b8ec22c7704a36b64912164e311

October 22, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: c9541b8ec22c7704a36b64912164e311SHA1: 835ce36aaba5acf0baf0af84439b1efcf8ac416eANALYSIS DATE: 2022-10-21T21:00:02ZTTPS: T1005, T1081, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – c9541b8ec22c7704a36b64912164e311
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 1784b275a3aa4f0e37ca55fa4eee6a50

October 22, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: 1784b275a3aa4f0e37ca55fa4eee6a50SHA1: 5b2497dff78037fe8cef29498e9f8579c1f94a73ANALYSIS DATE: 2022-10-21T22:20:24ZTTPS: T1082, T1107, T1490, T1091, T1060, T1112, T1005, T1081...

Read MoreRead more about Malware Analysis – persistence – 1784b275a3aa4f0e37ca55fa4eee6a50
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – f9a6cefa9b80c8c82426b4f43c8386a7

October 22, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, ransomware, themida, trojan, upxMD5: f9a6cefa9b80c8c82426b4f43c8386a7SHA1: 28fa185b03547f8441a43f1a4e91b961f5ad6bb8ANALYSIS DATE: 2022-10-21T21:55:17ZTTPS: T1012, T1120, T1082, T1497 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – evasion – f9a6cefa9b80c8c82426b4f43c8386a7
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – danabot – f43ac18b5edd49c9c4fe6620e17220ac

October 22, 2022

Score: 10 MALWARE FAMILY: danabotTAGS:family:danabot, family:djvu, family:smokeloader, family:vidar, botnet:517, backdoor, banker, collection, discovery, persistence, ransomware, spyware, stealer, trojanMD5: f43ac18b5edd49c9c4fe6620e17220acSHA1: ad94aa6c2447546e65063c9d453304ca1b5547b7ANALYSIS...

Read MoreRead more about Malware Analysis – danabot – f43ac18b5edd49c9c4fe6620e17220ac
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – f01771b29abf7e8498a428c2d53bffac

October 22, 2022

Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, persistence, ransomwareMD5: f01771b29abf7e8498a428c2d53bffacSHA1: 5dcc92ce9101bce9d807b09d682e2e80b0087271ANALYSIS DATE: 2022-10-21T22:34:38ZTTPS: T1012, T1082, T1120, T1060, T1112 ScoreMeaningExample10Known badA malware family...

Read MoreRead more about Malware Analysis – discovery – f01771b29abf7e8498a428c2d53bffac
osint
  • News

Infographic: How CNAPP Consolidate Cybersecurity Tools

October 21, 2022

A cloud-native application protection platform (CNAPP) consolidates your security tools, helping development, DevOps, cloud, and security teams sort each piece...

Read MoreRead more about Infographic: How CNAPP Consolidate Cybersecurity Tools
osint
  • News

Experts warn of CVE-2022-42889 Text4Shell exploit attempts

October 21, 2022

Wordfence researchers warn of exploitation attempts targeting the recently disclosed flaw in Apache Commons Text dubbed Text4Shell. Experts at WordPress security firm...

Read MoreRead more about Experts warn of CVE-2022-42889 Text4Shell exploit attempts
CISA_Logo
  • CISA

CISA: #StopRansomware: Daixin Team

October 21, 2022

#StopRansomware: Daixin Team CISA, the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) have...

Read MoreRead more about CISA: #StopRansomware: Daixin Team
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 437b022ea640e3f2ef6dffa5f0b58606

October 21, 2022

Score: 9 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomwareMD5: 437b022ea640e3f2ef6dffa5f0b58606SHA1: b68a8a1658c2ae6cff738178ced31db7e2cafe63ANALYSIS DATE: 2022-10-21T06:54:00ZTTPS: T1490, T1060, T1112 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – evasion – 437b022ea640e3f2ef6dffa5f0b58606
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 736c1b70cd49fc72e575a0fb4dacaed0

October 21, 2022

Score: 9 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomwareMD5: 736c1b70cd49fc72e575a0fb4dacaed0SHA1: f1462e828edd6607c229c6f98c61f85684117f63ANALYSIS DATE: 2022-10-21T07:09:18ZTTPS: T1490, T1060, T1112 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – evasion – 736c1b70cd49fc72e575a0fb4dacaed0
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – d9a45cad09b06bb232c0050fb4263e4f

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: d9a45cad09b06bb232c0050fb4263e4fSHA1: c90823242a31c83a49f2c161f7920cae1e115218ANALYSIS DATE: 2022-10-21T14:14:42ZTTPS: T1005, T1081, T1012, T1060,...

Read MoreRead more about Malware Analysis – djvu – d9a45cad09b06bb232c0050fb4263e4f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 6958fc7326e0893ae5fc204d74217c9d

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 6958fc7326e0893ae5fc204d74217c9dSHA1: 2f14c70a7b4be2b978389aa6868d74d9fd20ae30ANALYSIS DATE: 2022-10-21T14:40:23ZTTPS: T1060, T1112, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – 6958fc7326e0893ae5fc204d74217c9d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 8d18e31cf34a906ab2cea42d14aad351

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomwareMD5: 8d18e31cf34a906ab2cea42d14aad351SHA1: 65607a572919893e596dcf37fd25560ec1d1d058ANALYSIS DATE: 2022-10-21T14:38:13ZTTPS: T1060, T1112, T1222, T1082, T1012 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – djvu – 8d18e31cf34a906ab2cea42d14aad351
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – db2b87503b2f76ef39660af0903186f6

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: db2b87503b2f76ef39660af0903186f6SHA1: 7a793b7930b4988d42e0b5e5d75d734ce3738e3eANALYSIS DATE: 2022-10-21T14:20:44ZTTPS: T1012, T1060, T1112, T1082,...

Read MoreRead more about Malware Analysis – djvu – db2b87503b2f76ef39660af0903186f6
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 870172f3804834a399be0c291cecc756

October 21, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 870172f3804834a399be0c291cecc756SHA1: 1272fddefcda82716aa71c89d7d925a8c0e4f31fANALYSIS DATE: 2022-10-21T14:40:17ZTTPS: T1107, T1490, T1091, T1005, T1081, T1082 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 870172f3804834a399be0c291cecc756
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: full-payment-bypass-to-use-premium-subscription-byn0_m3rcy

October 21, 2022

Programme HackerOne Krisp Krisp Submitted by n0_m3rcy n0_m3rcy Report Full payment bypass to use premium subscription. Full Report A considerable...

Read MoreRead more about HackerOne Bug Bounty Disclosure: full-payment-bypass-to-use-premium-subscription-byn0_m3rcy

Posts pagination

Previous 1 … 2,955 2,956 2,957 2,958 2,959 2,960 2,961 … 4,204 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

HIBP-Banner-1
  • Data Breach

Catwatchful – 61,641 breached accounts

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6437

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6459

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6686

July 4, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5817

July 4, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel