Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Privacy by Design A Practical Guide to Data Protection in a Connected World

August 25, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – fd563fa52965b953fa28a92a50ff4e00

November 23, 2022

Score: 5 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: fd563fa52965b953fa28a92a50ff4e00SHA1: d9ce7ee332f8afab092a7a29c7be750b10d25b2fANALYSIS DATE: 2022-11-23T15:20:50ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – fd563fa52965b953fa28a92a50ff4e00
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – banker – a52ff18b7677432d274f28bdb766cf57

November 23, 2022

Score: 8 MALWARE FAMILY: bankerTAGS:banker, ransomwareMD5: a52ff18b7677432d274f28bdb766cf57SHA1: 281d6161ae3631c25b24f23b5a52d107540a8c43ANALYSIS DATE: 2022-11-23T15:20:58ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – banker – a52ff18b7677432d274f28bdb766cf57
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: dos-via-playbookbyvultza

November 23, 2022

Programme HackerOne Mattermost Mattermost Submitted by vultza vultza Report DoS via Playbook Full Report A considerable amount of time and...

Read MoreRead more about HackerOne Bug Bounty Disclosure: dos-via-playbookbyvultza
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: dos-via-automatic-response-messagebyvultza

November 23, 2022

Programme HackerOne Mattermost Mattermost Submitted by vultza vultza Report DoS via Automatic Response Message Full Report A considerable amount of...

Read MoreRead more about HackerOne Bug Bounty Disclosure: dos-via-automatic-response-messagebyvultza
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 7563b69f5b4a68a415de003f090ce8ee

November 23, 2022

Score: 6 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: 7563b69f5b4a68a415de003f090ce8eeSHA1: fdab9a9625fc71ee4078e46705be3c4313eac571ANALYSIS DATE: 2022-11-23T15:21:53ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – 7563b69f5b4a68a415de003f090ce8ee
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 66f46cd0347f2ec73a97d25785714a2e

November 23, 2022

Score: 7 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: 66f46cd0347f2ec73a97d25785714a2eSHA1: f48270f7d82981811eb0edf171fffc76d6c2b416ANALYSIS DATE: 2022-11-23T15:21:50ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – 66f46cd0347f2ec73a97d25785714a2e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – banker – 5816131ee36a5d08686c9ab9babc59c1

November 23, 2022

Score: 8 MALWARE FAMILY: bankerTAGS:banker, evasion, ransomwareMD5: 5816131ee36a5d08686c9ab9babc59c1SHA1: 67b42cc66d8562510985ee9c4b3ad7d2447f389aANALYSIS DATE: 2022-11-23T15:21:03ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – banker – 5816131ee36a5d08686c9ab9babc59c1
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 764bee482f158a88b3e1d8413f050711

November 23, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 764bee482f158a88b3e1d8413f050711SHA1: 820b614b42e89af0f602b33bb3dfe12472bd3c1bANALYSIS DATE: 2022-11-23T15:21:18ZTTPS: T1082, T1060, T1112, T1053,...

Read MoreRead more about Malware Analysis – djvu – 764bee482f158a88b3e1d8413f050711
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – adware – f693274485f1ef10524eaee98f7d6a4b

November 23, 2022

Score: 8 MALWARE FAMILY: adwareTAGS:adware, discovery, exploit, persistence, stealer, upxMD5: f693274485f1ef10524eaee98f7d6a4bSHA1: bd6a49605d9e71c97bacff6e3efadc1ef03f9320ANALYSIS DATE: 2022-11-23T15:44:45ZTTPS: T1060, T1112, T1222, T1082, T1012, T1120,...

Read MoreRead more about Malware Analysis – adware – f693274485f1ef10524eaee98f7d6a4b
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – adware – b508754cdaee0838f52c468e4550ddb3

November 23, 2022

Score: 8 MALWARE FAMILY: adwareTAGS:adware, discovery, exploit, persistence, stealerMD5: b508754cdaee0838f52c468e4550ddb3SHA1: e25fc3fda3e54c39969a490223e5c01a213716bbANALYSIS DATE: 2022-11-23T15:38:14ZTTPS: T1222, T1012, T1120, T1082, T1112, T1176, T1060...

Read MoreRead more about Malware Analysis – adware – b508754cdaee0838f52c468e4550ddb3
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – collection – 2cca32c4cf7dc6d10a2462fa9b74ae40

November 23, 2022

Score: 9 MALWARE FAMILY: collectionTAGS:collection, evasion, persistence, ransomware, trojanMD5: 2cca32c4cf7dc6d10a2462fa9b74ae40SHA1: 74f0125e8e0526b0e465d16668884006a4ee774aANALYSIS DATE: 2022-11-23T15:53:43ZTTPS: T1060, T1112, T1107, T1490, T1114, T1082 ScoreMeaningExample10Known...

Read MoreRead more about Malware Analysis – collection – 2cca32c4cf7dc6d10a2462fa9b74ae40
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – collection – a78423e9f6dd118ba745f5923de41cd5

November 23, 2022

Score: 9 MALWARE FAMILY: collectionTAGS:collection, evasion, persistence, ransomware, trojanMD5: a78423e9f6dd118ba745f5923de41cd5SHA1: e7ce99ba2a1fec0920d309ad3644359b0706e9afANALYSIS DATE: 2022-11-23T15:53:51ZTTPS: T1114, T1082, T1060, T1112, T1107, T1490 ScoreMeaningExample10Known...

Read MoreRead more about Malware Analysis – collection – a78423e9f6dd118ba745f5923de41cd5
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 77b493dabbd25c9509b3f82bf3a7efb7

November 23, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 77b493dabbd25c9509b3f82bf3a7efb7SHA1: eb7c03c6583dcfa53a9bf293ee2b31178412105dANALYSIS DATE: 2022-11-23T16:27:02ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 77b493dabbd25c9509b3f82bf3a7efb7
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 472862b6834a8e5207a46995a87f1995

November 23, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 472862b6834a8e5207a46995a87f1995SHA1: 3b7c92eacb6453bd828b184f5bdfa651aec58246ANALYSIS DATE: 2022-11-23T16:32:36ZTTPS: T1012, T1082, T1222, T1005,...

Read MoreRead more about Malware Analysis – djvu – 472862b6834a8e5207a46995a87f1995
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – discovery – 0a668a17b820bb20065e8e979cea7b39

November 23, 2022

Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, evasion, exploitMD5: 0a668a17b820bb20065e8e979cea7b39SHA1: b0607dbb2b3da5293f9465cf3143882873786ce0ANALYSIS DATE: 2022-11-23T16:52:19ZTTPS: T1082, T1031, T1562, T1489, T1112, T1222 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – discovery – 0a668a17b820bb20065e8e979cea7b39
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 09667e600ccb2be87c76e8af45417464

November 23, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 09667e600ccb2be87c76e8af45417464SHA1: 5d988dc88cc35115a00b6cef13204402a44665aeANALYSIS DATE: 2022-11-23T17:36:25ZTTPS: T1082, T1053, T1012, T1060,...

Read MoreRead more about Malware Analysis – djvu – 09667e600ccb2be87c76e8af45417464
HIVE
  • Data Breach
  • Ransomware

HIVE Ransomware Victim: Norman Public Schools

November 23, 2022

HIVE Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...

Read MoreRead more about HIVE Ransomware Victim: Norman Public Schools
1f9f5-1
  • News

Experts claim that iPhone’s analytics data is not anonymous

November 23, 2022

Researchers discovered that analytics data associated with iPhone include Directory Services Identifier (DSID) that could allow identifying users. Researchers at...

Read MoreRead more about Experts claim that iPhone’s analytics data is not anonymous
Digital Binary Code on Dark Red Background. Data Breach
  • Data Breach

Not Acxiom (unverified) – 51,730,831 breached accounts

November 23, 2022

In 2020, a corpus of data containing almost a quarter of a billion records spanning over 400 different fields was...

Read MoreRead more about Not Acxiom (unverified) – 51,730,831 breached accounts
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: scottindustrialsystems[.]com

November 23, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: scottindustrialsystems[.]com
scrcpy_2_screenshot-debian-600
  • Tools

Scrcpy – Display And Control Your Android Device

November 23, 2022

pronounced "screen copy"Read in another languageThis application provides display and control of Android devices connected via USB or over TCP/IP....

Read MoreRead more about Scrcpy – Display And Control Your Android Device
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 195[.]189[.]99[.]114:8443

November 23, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 195[.]189[.]99[.]114:8443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 107[.]189[.]14[.]155:80

November 23, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 107[.]189[.]14[.]155:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 39[.]104[.]165[.]139:80

November 23, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 39[.]104[.]165[.]139:80

Posts pagination

Previous 1 … 2,999 3,000 3,001 3,002 3,003 3,004 3,005 … 4,378 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[DIREWOLF] – Ransomware Victim: 台灣東洋國際儀表股份有限公司

August 26, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9172 – pierrelannoy – Vibes

August 26, 2025
image
  • Data Breach
  • Ransomware

[DIREWOLF] – Ransomware Victim: 台灣東洋國際儀表股份有限公司

August 26, 2025
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: marlboroughpartners[.]com

August 26, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: hydrometrics[.]com

August 26, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel