Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Privacy by Design A Practical Guide to Data Protection in a Connected World

August 25, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Attack Surface Management 2022 Midyear Review Part 1

October 20, 2022

In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in the...

Read MoreRead more about Attack Surface Management 2022 Midyear Review Part 1
osint
  • News

Experts spotted a new undetectable PowerShell Backdoor posing as a Windows update

October 20, 2022

Cybersecurity researchers warn of a new PowerShell backdoor that disguises itself as part of the Windows update process to avoid...

Read MoreRead more about Experts spotted a new undetectable PowerShell Backdoor posing as a Windows update
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – conti – 290c7dfb01e50cea9e19da81a781af2c

October 20, 2022

Score: 10 MALWARE FAMILY: contiTAGS:family:conti, ransomwareMD5: 290c7dfb01e50cea9e19da81a781af2cSHA1: 8a52c7645ec8fd6c217dfe5491461372acc4e849ANALYSIS DATE: 2022-10-20T14:58:36ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – conti – 290c7dfb01e50cea9e19da81a781af2c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 879c457a1652bb23ed26dacf248f616c

October 20, 2022

Score: 8 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealer, upxMD5: 879c457a1652bb23ed26dacf248f616cSHA1: 8d6a3b1f492d7dbed77d079749685dd5ac37f628ANALYSIS DATE: 2022-10-20T14:58:37ZTTPS: T1005, T1081, T1082, T1060, T1112 ScoreMeaningExample10Known badA...

Read MoreRead more about Malware Analysis – persistence – 879c457a1652bb23ed26dacf248f616c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – a75ac296c79e8bcbc858bd63e1b366ff

October 20, 2022

Score: 7 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: a75ac296c79e8bcbc858bd63e1b366ffSHA1: 61ca3a0bf77c3dd114530a7b3c5970930628fbe5ANALYSIS DATE: 2022-10-20T14:29:00ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – evasion – a75ac296c79e8bcbc858bd63e1b366ff
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 96e4fd7e9a5995525b54a249eda2d1d0

October 20, 2022

Score: 8 MALWARE FAMILY: persistenceTAGS:persistence, spyware, stealer, upxMD5: 96e4fd7e9a5995525b54a249eda2d1d0SHA1: a89487e40377e09c1f9dc97793f042b3f6352f5cANALYSIS DATE: 2022-10-20T14:59:32ZTTPS: T1060, T1112, T1082, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – persistence – 96e4fd7e9a5995525b54a249eda2d1d0
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 96670058d1b53755214428e67ef461bb

October 20, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, trojanMD5: 96670058d1b53755214428e67ef461bbSHA1: 73f051c7362dcc40ef6eef9b1b64d4c247c07795ANALYSIS DATE: 2022-10-20T14:59:38ZTTPS: T1012, T1120, T1082, T1060, T1112, T1088, T1089, T1004,...

Read MoreRead more about Malware Analysis – evasion – 96670058d1b53755214428e67ef461bb
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – teslacrypt – bb42ac7cdc834ba9abb5b4b90025f022

October 20, 2022

Score: 10 MALWARE FAMILY: teslacryptTAGS:family:teslacrypt, persistence, ransomwareMD5: bb42ac7cdc834ba9abb5b4b90025f022SHA1: 3c75d402cca4de4898ac07888900ee7560b9536eANALYSIS DATE: 2022-10-20T14:58:49ZTTPS: T1082, T1060, T1112, T1107, T1490 ScoreMeaningExample10Known badA malware family...

Read MoreRead more about Malware Analysis – teslacrypt – bb42ac7cdc834ba9abb5b4b90025f022
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – a04ae26b12ca623a60efc3a8591087f4

October 20, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, trojanMD5: a04ae26b12ca623a60efc3a8591087f4SHA1: 9455e95c390f589af7e80f95801deb2aa9db347eANALYSIS DATE: 2022-10-20T14:59:36ZTTPS: T1490, T1012, T1120, T1082, T1060, T1112, T1004, T1158,...

Read MoreRead more about Malware Analysis – evasion – a04ae26b12ca623a60efc3a8591087f4
osint
  • News

BlueBleed: Microsoft confirmed data leak exposing customers’ info

October 20, 2022

Microsoft disclosed a data leak, sensitive data of some of its customers were exposed by a misconfigured Microsoft server accessible...

Read MoreRead more about BlueBleed: Microsoft confirmed data leak exposing customers’ info
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 5f594a891ee0a26be4f22295485b033e

October 20, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, trojanMD5: 5f594a891ee0a26be4f22295485b033eSHA1: c00016c8189aa454aa334fb3e812a5b817a8d9e1ANALYSIS DATE: 2022-10-20T14:59:40ZTTPS: T1004, T1112, T1082, T1088, T1089, T1060, T1491, T1012,...

Read MoreRead more about Malware Analysis – evasion – 5f594a891ee0a26be4f22295485b033e
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – fb830824292fb0bf97f8a691bddd377f

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: fb830824292fb0bf97f8a691bddd377fSHA1: efa617db6da4fc0694b74b8591619b14f2ac752eANALYSIS DATE: 2022-10-20T15:00:33ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091, T1060, T1112...

Read MoreRead more about Malware Analysis – persistence – fb830824292fb0bf97f8a691bddd377f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – c014ffc9b9f05e9cc28441ab135a22a7

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: c014ffc9b9f05e9cc28441ab135a22a7SHA1: be05a0aa28ec361540adaba63424544d43609273ANALYSIS DATE: 2022-10-20T15:00:23ZTTPS: T1107, T1490, T1091, T1060, T1112, T1005, T1081, T1082...

Read MoreRead more about Malware Analysis – persistence – c014ffc9b9f05e9cc28441ab135a22a7
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 548c1fff6217572e344bfb4a2a529867

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: 548c1fff6217572e344bfb4a2a529867SHA1: fd5dd09fd0b305d3405094c4e1216ca57f956efdANALYSIS DATE: 2022-10-20T15:00:43ZTTPS: T1107, T1490, T1091, T1060, T1112, T1005, T1081, T1082...

Read MoreRead more about Malware Analysis – persistence – 548c1fff6217572e344bfb4a2a529867
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 92469931cb44beb2b06bb19fc1f2a327

October 20, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 92469931cb44beb2b06bb19fc1f2a327SHA1: 85e96b0294d384522f948f43ea6030800cb19c05ANALYSIS DATE: 2022-10-20T15:01:03ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 92469931cb44beb2b06bb19fc1f2a327
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – bf0ceb4b5062a087d32a6ae14bb46895

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: bf0ceb4b5062a087d32a6ae14bb46895SHA1: c6b83a14fc3790d484e237d95293e92004104768ANALYSIS DATE: 2022-10-20T15:00:49ZTTPS: T1107, T1490, T1091, T1060, T1112, T1005, T1081, T1082...

Read MoreRead more about Malware Analysis – persistence – bf0ceb4b5062a087d32a6ae14bb46895
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 38faa63bb0de5674847b6049e9a9f780

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: 38faa63bb0de5674847b6049e9a9f780SHA1: 71d5b298b2f0655ea892a3d3660f92015393e83eANALYSIS DATE: 2022-10-20T15:00:59ZTTPS: T1107, T1490, T1091, T1060, T1112, T1005, T1081, T1082...

Read MoreRead more about Malware Analysis – persistence – 38faa63bb0de5674847b6049e9a9f780
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 4780aef00be23f093c688bff0678388b

October 20, 2022

Score: 8 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, upxMD5: 4780aef00be23f093c688bff0678388bSHA1: 45d8398f1c6cb00cb7721fd208de99ccb9c93ab4ANALYSIS DATE: 2022-10-20T15:10:45ZTTPS: T1012, T1082, T1112, T1158, T1057, T1491, T1060 ScoreMeaningExample10Known...

Read MoreRead more about Malware Analysis – evasion – 4780aef00be23f093c688bff0678388b
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – e1e7c39dfb76e42fea4d5ee81e4f21cd

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: e1e7c39dfb76e42fea4d5ee81e4f21cdSHA1: 353915351f9bf53b55c6ef0324c0d35379bb6c94ANALYSIS DATE: 2022-10-20T15:20:19ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091, T1060, T1112...

Read MoreRead more about Malware Analysis – persistence – e1e7c39dfb76e42fea4d5ee81e4f21cd
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – – 499eec4dab168f19d1ee282f66f724b0

October 20, 2022

Score: 8 MALWARE FAMILY: TAGS:MD5: 499eec4dab168f19d1ee282f66f724b0SHA1: ec42e15f7b138a5572a3b5cb1a022cd82f1d7279ANALYSIS DATE: 2022-10-20T15:29:32ZTTPS: T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – – 499eec4dab168f19d1ee282f66f724b0
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 1194a0f50753c9e2de2ca167e9126e4d

October 20, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: 1194a0f50753c9e2de2ca167e9126e4dSHA1: 348b33d313f1adad9c4429ff59cae236f83b24dcANALYSIS DATE: 2022-10-20T15:20:33ZTTPS: T1082, T1107, T1490, T1091, T1060, T1112, T1005, T1081...

Read MoreRead more about Malware Analysis – persistence – 1194a0f50753c9e2de2ca167e9126e4d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 548b95bb2513576d2887d1871bcc3990

October 20, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 548b95bb2513576d2887d1871bcc3990SHA1: 6699c6a95ea88d9c0e84ecd55fc47006e9870104ANALYSIS DATE: 2022-10-20T15:26:14ZTTPS: T1060, T1112, T1053, T1005,...

Read MoreRead more about Malware Analysis – djvu – 548b95bb2513576d2887d1871bcc3990
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: [csrf]-no-csrf-protection-against-sending-invitation-to-join-the-team-byimran_nisar

October 20, 2022

Programme HackerOne Lark Technologies Lark Technologies Submitted by imran_nisar imran_nisar Report No Csrf protection against sending invitation to join the...

Read MoreRead more about HackerOne Bug Bounty Disclosure: [csrf]-no-csrf-protection-against-sending-invitation-to-join-the-team-byimran_nisar
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: removed-user-can-still-view-comments-on-the-file/documents-byimran_nisar

October 20, 2022

Programme HackerOne Lark Technologies Lark Technologies Submitted by imran_nisar imran_nisar Report Removed user can still view comments on the file/documents....

Read MoreRead more about HackerOne Bug Bounty Disclosure: removed-user-can-still-view-comments-on-the-file/documents-byimran_nisar

Posts pagination

Previous 1 … 3,137 3,138 3,139 3,140 3,141 3,142 3,143 … 4,378 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[DIREWOLF] – Ransomware Victim: 台灣東洋國際儀表股份有限公司

August 26, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9172 – pierrelannoy – Vibes

August 26, 2025
image
  • Data Breach
  • Ransomware

[DIREWOLF] – Ransomware Victim: 台灣東洋國際儀表股份有限公司

August 26, 2025
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: marlboroughpartners[.]com

August 26, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: hydrometrics[.]com

August 26, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel