Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025
unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 9e348def7efcaa8313170d7b62a54986

October 21, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 9e348def7efcaa8313170d7b62a54986SHA1: 4fd08bd3ed1c781b663e4745d942b2fabe0a13b4ANALYSIS DATE: 2022-10-20T22:40:23ZTTPS: T1107, T1490, T1091, T1005, T1081, T1082 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 9e348def7efcaa8313170d7b62a54986
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 248dd76b7d66b2f80f64ebfbf3370a7c

October 21, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 248dd76b7d66b2f80f64ebfbf3370a7cSHA1: 7244aeeaa57ca5b2c18932fc15d1638ed0dd4e8dANALYSIS DATE: 2022-10-20T22:44:52ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 248dd76b7d66b2f80f64ebfbf3370a7c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – 4ec905ca34582ff0931c1813a63febe1

October 21, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, ransomware, wormMD5: 4ec905ca34582ff0931c1813a63febe1SHA1: 6fdae2ec1763e345adcd8c956855b588b0c78ed4ANALYSIS DATE: 2022-10-20T22:40:42ZTTPS: T1046 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – wannacry – 4ec905ca34582ff0931c1813a63febe1
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – b68ef4cdc50d0628782a0fffd6996a0d

October 21, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, ransomware, wormMD5: b68ef4cdc50d0628782a0fffd6996a0dSHA1: 9e96ad3dea809b9bbe0b49668120be039c7fc4f9ANALYSIS DATE: 2022-10-20T22:40:34ZTTPS: T1046 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – wannacry – b68ef4cdc50d0628782a0fffd6996a0d
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 20[.]101[.]35[.]71:80

October 21, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 20[.]101[.]35[.]71:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 206[.]119[.]205[.]135:443

October 21, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 206[.]119[.]205[.]135:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 206[.]119[.]205[.]123:443

October 21, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 206[.]119[.]205[.]123:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 206[.]119[.]205[.]230:443

October 21, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 206[.]119[.]205[.]230:443
osint
  • News

Solve the Cloud-Native App Security Puzzle with CNAPP

October 20, 2022

Explore the value of integrating cloud-native application protection into security and development. If you like the site, please consider joining...

Read MoreRead more about Solve the Cloud-Native App Security Puzzle with CNAPP
osint
  • News

Ransomware Insurance Security Strategies

October 20, 2022

Ransomware accounts for 75% of all cyber insurance claims yet 40% of business currently lack the coverage needed. Discover how...

Read MoreRead more about Ransomware Insurance Security Strategies
osint
  • News

Attack Surface Management 2022 Midyear Review Part 1

October 20, 2022

In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in the...

Read MoreRead more about Attack Surface Management 2022 Midyear Review Part 1
osint
  • News

Experts spotted a new undetectable PowerShell Backdoor posing as a Windows update

October 20, 2022

Cybersecurity researchers warn of a new PowerShell backdoor that disguises itself as part of the Windows update process to avoid...

Read MoreRead more about Experts spotted a new undetectable PowerShell Backdoor posing as a Windows update
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – conti – 290c7dfb01e50cea9e19da81a781af2c

October 20, 2022

Score: 10 MALWARE FAMILY: contiTAGS:family:conti, ransomwareMD5: 290c7dfb01e50cea9e19da81a781af2cSHA1: 8a52c7645ec8fd6c217dfe5491461372acc4e849ANALYSIS DATE: 2022-10-20T14:58:36ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – conti – 290c7dfb01e50cea9e19da81a781af2c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 879c457a1652bb23ed26dacf248f616c

October 20, 2022

Score: 8 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealer, upxMD5: 879c457a1652bb23ed26dacf248f616cSHA1: 8d6a3b1f492d7dbed77d079749685dd5ac37f628ANALYSIS DATE: 2022-10-20T14:58:37ZTTPS: T1005, T1081, T1082, T1060, T1112 ScoreMeaningExample10Known badA...

Read MoreRead more about Malware Analysis – persistence – 879c457a1652bb23ed26dacf248f616c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – a75ac296c79e8bcbc858bd63e1b366ff

October 20, 2022

Score: 7 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: a75ac296c79e8bcbc858bd63e1b366ffSHA1: 61ca3a0bf77c3dd114530a7b3c5970930628fbe5ANALYSIS DATE: 2022-10-20T14:29:00ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – a75ac296c79e8bcbc858bd63e1b366ff
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 96e4fd7e9a5995525b54a249eda2d1d0

October 20, 2022

Score: 8 MALWARE FAMILY: persistenceTAGS:persistence, spyware, stealer, upxMD5: 96e4fd7e9a5995525b54a249eda2d1d0SHA1: a89487e40377e09c1f9dc97793f042b3f6352f5cANALYSIS DATE: 2022-10-20T14:59:32ZTTPS: T1060, T1112, T1082, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – persistence – 96e4fd7e9a5995525b54a249eda2d1d0
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 96670058d1b53755214428e67ef461bb

October 20, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, trojanMD5: 96670058d1b53755214428e67ef461bbSHA1: 73f051c7362dcc40ef6eef9b1b64d4c247c07795ANALYSIS DATE: 2022-10-20T14:59:38ZTTPS: T1012, T1120, T1082, T1060, T1112, T1088, T1089, T1004,...

Read MoreRead more about Malware Analysis – evasion – 96670058d1b53755214428e67ef461bb
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – teslacrypt – bb42ac7cdc834ba9abb5b4b90025f022

October 20, 2022

Score: 10 MALWARE FAMILY: teslacryptTAGS:family:teslacrypt, persistence, ransomwareMD5: bb42ac7cdc834ba9abb5b4b90025f022SHA1: 3c75d402cca4de4898ac07888900ee7560b9536eANALYSIS DATE: 2022-10-20T14:58:49ZTTPS: T1082, T1060, T1112, T1107, T1490 ScoreMeaningExample10Known badA malware family...

Read MoreRead more about Malware Analysis – teslacrypt – bb42ac7cdc834ba9abb5b4b90025f022
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – a04ae26b12ca623a60efc3a8591087f4

October 20, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, trojanMD5: a04ae26b12ca623a60efc3a8591087f4SHA1: 9455e95c390f589af7e80f95801deb2aa9db347eANALYSIS DATE: 2022-10-20T14:59:36ZTTPS: T1490, T1012, T1120, T1082, T1060, T1112, T1004, T1158,...

Read MoreRead more about Malware Analysis – evasion – a04ae26b12ca623a60efc3a8591087f4
osint
  • News

BlueBleed: Microsoft confirmed data leak exposing customers’ info

October 20, 2022

Microsoft disclosed a data leak, sensitive data of some of its customers were exposed by a misconfigured Microsoft server accessible...

Read MoreRead more about BlueBleed: Microsoft confirmed data leak exposing customers’ info
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 5f594a891ee0a26be4f22295485b033e

October 20, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, trojanMD5: 5f594a891ee0a26be4f22295485b033eSHA1: c00016c8189aa454aa334fb3e812a5b817a8d9e1ANALYSIS DATE: 2022-10-20T14:59:40ZTTPS: T1004, T1112, T1082, T1088, T1089, T1060, T1491, T1012,...

Read MoreRead more about Malware Analysis – evasion – 5f594a891ee0a26be4f22295485b033e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – fb830824292fb0bf97f8a691bddd377f

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: fb830824292fb0bf97f8a691bddd377fSHA1: efa617db6da4fc0694b74b8591619b14f2ac752eANALYSIS DATE: 2022-10-20T15:00:33ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091, T1060, T1112...

Read MoreRead more about Malware Analysis – persistence – fb830824292fb0bf97f8a691bddd377f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – c014ffc9b9f05e9cc28441ab135a22a7

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: c014ffc9b9f05e9cc28441ab135a22a7SHA1: be05a0aa28ec361540adaba63424544d43609273ANALYSIS DATE: 2022-10-20T15:00:23ZTTPS: T1107, T1490, T1091, T1060, T1112, T1005, T1081, T1082...

Read MoreRead more about Malware Analysis – persistence – c014ffc9b9f05e9cc28441ab135a22a7
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 548c1fff6217572e344bfb4a2a529867

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: 548c1fff6217572e344bfb4a2a529867SHA1: fd5dd09fd0b305d3405094c4e1216ca57f956efdANALYSIS DATE: 2022-10-20T15:00:43ZTTPS: T1107, T1490, T1091, T1060, T1112, T1005, T1081, T1082...

Read MoreRead more about Malware Analysis – persistence – 548c1fff6217572e344bfb4a2a529867

Posts pagination

Previous 1 … 2,967 2,968 2,969 2,970 2,971 2,972 2,973 … 4,208 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[INTERLOCK] – Ransomware Victim: Your Building Centers

July 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27449

July 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27450

July 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27448

July 5, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-27451

July 5, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel