Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025
london-bridge
  • Premium Members Content
  • Try Hack Me

[TRYHACKME] – LondonBridge Full Walkthrough.

September 10, 2025
unlock_membership
  • Premium Members Content

Navigating Cybersecurity Compliance and Regulations

September 5, 2025
try_hack_me_order
  • Premium Members Content
  • Try Hack Me

Try Hack Me Walkthrough: ORDER

September 1, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management Unlocked: A Practical Guide for 2025

September 1, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 758ec5a0f7a4a0953f66a7c5fce15ac4

November 10, 2022

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:redline, family:smokeloader, family:vidar, botnet:517, botnet:google2, botnet:mario23_10, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer,...

Read MoreRead more about Malware Analysis – amadey – 758ec5a0f7a4a0953f66a7c5fce15ac4
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 1980259c88fd2e3c5ce8f75da226105e

November 10, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 1980259c88fd2e3c5ce8f75da226105eSHA1: 24a4abe16059cd4910efd1f0c68dce88a2473487ANALYSIS DATE: 2022-11-10T15:44:24ZTTPS: T1060, T1112, T1222, T1005,...

Read MoreRead more about Malware Analysis – djvu – 1980259c88fd2e3c5ce8f75da226105e
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: – Panel access at https://news-push-88.op-mobile.opera.com/. – By rahul0x01

November 10, 2022

The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...

Read MoreRead more about BugCrowd Bug Bounty Disclosure: – Panel access at https://news-push-88.op-mobile.opera.com/. – By rahul0x01
CISA_Logo
  • CISA

CISA: CISA Releases Twenty Industrial Control Systems Advisories

November 10, 2022

CISA Releases Twenty Industrial Control Systems Advisories CISA has released twenty (20) Industrial Control Systems (ICS) advisories on November 10,...

Read MoreRead more about CISA: CISA Releases Twenty Industrial Control Systems Advisories
osint
  • News

Researchers warn of malicious packages on PyPI using steganography

November 10, 2022

Experts discovered a malicious package on the Python Package Index (PyPI) that uses steganographic to hide malware within image files....

Read MoreRead more about Researchers warn of malicious packages on PyPI using steganography
CISA_Logo
  • CISA

CISA: CISA Releases SSVC Methodology to Prioritize Vulnerabilities

November 10, 2022

CISA Releases SSVC Methodology to Prioritize Vulnerabilities Today CISA published its guide on Stakeholder-Specific Vulnerability Categorization (SSVC), a vulnerability management...

Read MoreRead more about CISA: CISA Releases SSVC Methodology to Prioritize Vulnerabilities
osint
  • News

A bug in ABB Totalflow flow computers exposed oil and gas companies to attack

November 10, 2022

A flaw in the ABB Totalflow system used in oil and gas organizations could be exploited by an attacker to...

Read MoreRead more about A bug in ABB Totalflow flow computers exposed oil and gas companies to attack
NGWAF_1_Architecture
  • Tools

NGWAF – First Iteration Of ML Based Feedback WAF

November 10, 2022

  This can be achieved in the following steps: Create a new dataset (.csv) for upload in the following format...

Read MoreRead more about NGWAF – First Iteration Of ML Based Feedback WAF
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 120[.]27[.]227[.]99:80

November 10, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 120[.]27[.]227[.]99:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 101[.]43[.]4[.]39:8443

November 10, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 101[.]43[.]4[.]39:8443
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – azov – ffee009b572a16093cfffe7f8e3d963a

November 10, 2022

Score: 10 MALWARE FAMILY: azovTAGS:family:azov, persistence, ransomware, wiperMD5: ffee009b572a16093cfffe7f8e3d963aSHA1: c499d2778dc2746a08ef90d259e2f6834ed17cdfANALYSIS DATE: 2022-11-10T09:00:45ZTTPS: T1012, T1120, T1082, T1060, T1112 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – azov – ffee009b572a16093cfffe7f8e3d963a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – azov – 6468ee100d88c71d55dfdcf4e30f991e

November 10, 2022

Score: 10 MALWARE FAMILY: azovTAGS:family:azov, ransomware, spyware, stealer, wiperMD5: 6468ee100d88c71d55dfdcf4e30f991eSHA1: 5c520d2d7dc4c9e5d536d3aff998185657d40ac8ANALYSIS DATE: 2022-11-10T09:01:07ZTTPS: T1012, T1120, T1082, T1005, T1081 ScoreMeaningExample10Known badA...

Read MoreRead more about Malware Analysis – azov – 6468ee100d88c71d55dfdcf4e30f991e
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 47[.]96[.]136[.]229:443

November 10, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 47[.]96[.]136[.]229:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 124[.]221[.]207[.]103:80

November 10, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 124[.]221[.]207[.]103:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 107[.]174[.]95[.]204:6666

November 10, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 107[.]174[.]95[.]204:6666
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 101[.]201[.]35[.]218:6666

November 10, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 101[.]201[.]35[.]218:6666
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 068a01b46b7fd84d9d37d37b9307c514

November 10, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 068a01b46b7fd84d9d37d37b9307c514SHA1: 5b659a6d2c3c3c3e79e2dff0e0d61abe0d6e5325ANALYSIS DATE: 2022-11-10T10:53:29ZTTPS: T1222, T1082, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 068a01b46b7fd84d9d37d37b9307c514
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – chaos – f28dab0d7488b9d69a566c9ca7c084e1

November 10, 2022

Score: 10 MALWARE FAMILY: chaosTAGS:family:chaos, evasion, persistence, ransomware, spyware, stealerMD5: f28dab0d7488b9d69a566c9ca7c084e1SHA1: 32537b66204e8c76642da46aa286433cb868b453ANALYSIS DATE: 2022-11-10T10:20:08ZTTPS: T1490, T1059, T1107, T1005, T1081, T1082,...

Read MoreRead more about Malware Analysis – chaos – f28dab0d7488b9d69a566c9ca7c084e1
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – 2246127934495b3206cb318271092a5d

November 10, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, ransomware, wormMD5: 2246127934495b3206cb318271092a5dSHA1: bb1d5148afc44635a9e103de45441c4c75db64aaANALYSIS DATE: 2022-11-10T10:40:26ZTTPS: T1046 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – wannacry – 2246127934495b3206cb318271092a5d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – 9f73c18d38017fdef2011b186dead35b

November 10, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, ransomware, wormMD5: 9f73c18d38017fdef2011b186dead35bSHA1: de15099805cce28f7fec1edf701e3d1f14d66f51ANALYSIS DATE: 2022-11-10T10:00:31ZTTPS: T1046 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – wannacry – 9f73c18d38017fdef2011b186dead35b
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – blackcat – d28d12f328105aa089129301da9919d0

November 10, 2022

Score: 10 MALWARE FAMILY: blackcatTAGS:family:blackcat, discovery, evasion, ransomware, trojanMD5: d28d12f328105aa089129301da9919d0SHA1: 234f34e9725dadcf109e3c8065f1841d4c2f74e9ANALYSIS DATE: 2022-11-10T11:04:58ZTTPS: T1107, T1490, T1012, T1120, T1082, T1089, T1112,...

Read MoreRead more about Malware Analysis – blackcat – d28d12f328105aa089129301da9919d0
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – wannacry – b54c96716a5453ad729d91bb5fb39bf9

November 10, 2022

Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, discovery, ransomware, wormMD5: b54c96716a5453ad729d91bb5fb39bf9SHA1: c72f2c21ef5e82132fd1c68f4e0afe6e0a94ccf6ANALYSIS DATE: 2022-11-10T11:00:32ZTTPS: T1046 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...

Read MoreRead more about Malware Analysis – wannacry – b54c96716a5453ad729d91bb5fb39bf9
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 4617028009902b4530adbfee151d3126

November 10, 2022

Score: 10 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: 4617028009902b4530adbfee151d3126SHA1: 186828382c2d4e3be2054675614bef990972b23aANALYSIS DATE: 2022-11-10T11:00:18ZTTPS: T1059, T1107, T1490 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or...

Read MoreRead more about Malware Analysis – ransomware – 4617028009902b4530adbfee151d3126
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – amadey – 29edbd2942ee93a290930a8384fb0362

November 10, 2022

Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:dcrat, family:djvu, family:raccoon, family:redline, family:smokeloader, family:vidar, botnet:517, botnet:53508e7dc4e08bd33122d190a04a1200, botnet:mario23_10, backdoor, collection, discovery, infostealer, persistence, ransomware,...

Read MoreRead more about Malware Analysis – amadey – 29edbd2942ee93a290930a8384fb0362

Posts pagination

Previous 1 … 3,075 3,076 3,077 3,078 3,079 3,080 3,081 … 4,412 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P3 – Publicly Editable Google Docs Linked from NASA SnowEx PPT –

September 16, 2025
Bugcrowd Logo
  • Bug Bounty

BugCrowd Bug Bounty Disclosure: P3 – Details of the collaboration between NASA and Inmarsat Government and the type of contract –

September 16, 2025
hkcert
  • HKCERT
  • News

Apple Products Multiple Vulnerabilities

September 16, 2025
HIBP-Banner-1
  • Data Breach

Miljödata – 870,108 breached accounts

September 16, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 119[.]91[.]203[.]199:88

September 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel