Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Privacy by Design A Practical Guide to Data Protection in a Connected World

August 25, 2025
unlock_membership
  • Premium Members Content

Network Security Essentials for a Safer Digital World

August 22, 2025
unlock_membership
  • Premium Members Content

Cyber Security Risk Management A Practical Guide for 2025

August 20, 2025
unlock_membership
  • Premium Members Content

Mastering Privacy and Data Protection in the Digital Era

August 18, 2025
unlock_membership
  • Premium Members Content

Zero Trust Security Unlocked A Practical Guide to Modern Access Control and Cloud Security

August 13, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: cve-2017-5929:-hyperledger—arbitrary-deserialization-of-untrusted-databymik-patient

October 18, 2022

Programme HackerOne Hyperledger Hyperledger Submitted by mik-patient mik-patient Report CVE-2017-5929: Hyperledger - Arbitrary Deserialization of Untrusted Data Full Report A...

Read MoreRead more about HackerOne Bug Bounty Disclosure: cve-2017-5929:-hyperledger—arbitrary-deserialization-of-untrusted-databymik-patient
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 785707b3639ae4314f42739052fe4522

October 18, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 785707b3639ae4314f42739052fe4522SHA1: fa1662e7d4478ab2b90a896ad3aff21d6a750d0aANALYSIS DATE: 2022-10-18T15:44:22ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 785707b3639ae4314f42739052fe4522
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 8c23878d1e3d7e55e550fb9f448ee9cd

October 18, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 8c23878d1e3d7e55e550fb9f448ee9cdSHA1: 5947275ba5ba1d4bf4c142b149b49b971541de83ANALYSIS DATE: 2022-10-18T15:44:11ZTTPS: T1091, T1005, T1081, T1082, T1107, T1490 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 8c23878d1e3d7e55e550fb9f448ee9cd
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – d8499954c090d87e4b96f8f23fba2bf9

October 18, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: d8499954c090d87e4b96f8f23fba2bf9SHA1: 755c3889c6215d8fbf4d285c0fab265d33d638c2ANALYSIS DATE: 2022-10-18T15:43:45ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – d8499954c090d87e4b96f8f23fba2bf9
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 8b9c9005f476efee5bc8572ebe809c75

October 18, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 8b9c9005f476efee5bc8572ebe809c75SHA1: b0e66376cb6689cbb274c96eafa5f2188db1cf7aANALYSIS DATE: 2022-10-18T15:43:56ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 8b9c9005f476efee5bc8572ebe809c75
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – c0555bca1e61680eebfdc150c69f0e61

October 18, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: c0555bca1e61680eebfdc150c69f0e61SHA1: 11436e8b833d7c5b7e5484232e0b3599ed9f523eANALYSIS DATE: 2022-10-18T16:20:23ZTTPS: T1005, T1081, T1107, T1490, T1082, T1091, T1060, T1112...

Read MoreRead more about Malware Analysis – persistence – c0555bca1e61680eebfdc150c69f0e61
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 30cc5141307b477bad1d38b3dc995a14

October 18, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, family:vidar, botnet:517, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojan, vmprotectMD5: 30cc5141307b477bad1d38b3dc995a14SHA1:...

Read MoreRead more about Malware Analysis – djvu – 30cc5141307b477bad1d38b3dc995a14
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – be971d880e75cd48a669ea9e45f6f022

October 18, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: be971d880e75cd48a669ea9e45f6f022SHA1: 43b24f5108ff16c56e836082da80128fe516d8afANALYSIS DATE: 2022-10-18T16:40:18ZTTPS: T1107, T1490, T1012, T1120, T1082, T1031, T1562, T1489 ScoreMeaningExample10Known badA...

Read MoreRead more about Malware Analysis – evasion – be971d880e75cd48a669ea9e45f6f022
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 045fd4d06498c33b0b136601bc41114f

October 18, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: 045fd4d06498c33b0b136601bc41114fSHA1: 78c5c444c587df842284bcf054f3b75047330e37ANALYSIS DATE: 2022-10-18T16:20:29ZTTPS: T1107, T1490, T1091, T1060, T1112, T1005, T1081, T1082...

Read MoreRead more about Malware Analysis – persistence – 045fd4d06498c33b0b136601bc41114f
osint
  • News

Law enforcement arrested 31 suspects for stealing cars by hacking key fobs

October 18, 2022

An international law enforcement operation led by Europol disrupted a cybercrime ring focused on hacking wireless key fobs to steal...

Read MoreRead more about Law enforcement arrested 31 suspects for stealing cars by hacking key fobs
osint
  • News

China-linked APT41 group targets Hong Kong with Spyder Loader

October 18, 2022

China-linked threat actors APT41 (a.k.a. Winnti) targeted organizations in Hong Kong, in some cases remaining undetected for a year. Symantec...

Read MoreRead more about China-linked APT41 group targets Hong Kong with Spyder Loader
osint
  • News

Critical Remote Code Execution issue impacts popular post-exploitation toolkit Cobalt Strike

October 18, 2022

HelpSystems, the company that developed the Cobalt Strike platform, addressed a critical remote code execution vulnerability in its software. HelpSystems,...

Read MoreRead more about Critical Remote Code Execution issue impacts popular post-exploitation toolkit Cobalt Strike
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: oomiya[.]co[.]jp

October 18, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: oomiya[.]co[.]jp
osint
  • Tools

xnLinkFinder – A Python Tool Used To Discover Endpoints (And Potential Parameters) For A Given Target

October 18, 2022

About - v2.0 This is a tool used to discover ... Piped input and output: Good luck and good hunting!...

Read MoreRead more about xnLinkFinder – A Python Tool Used To Discover Endpoints (And Potential Parameters) For A Given Target
osint
  • News

Over 17000 Fortinet devices exposed online are very likely vulnerable to CVE-2022-40684

October 18, 2022

Fortinet confirmed that many systems are still vulnerable to attacks exploiting the CVE-2022-40684 zero-day vulnerability. Fortinet is urging customers to address...

Read MoreRead more about Over 17000 Fortinet devices exposed online are very likely vulnerable to CVE-2022-40684
osint
  • News

CVE-2022-28762: Zoom for macOS contains a debugging port misconfiguration

October 18, 2022

Video messaging company Zoom fixed a high-severity vulnerability, tracked as CVE-2022-28762, in Zoom Client for Meetings for macOS. Zoom Client...

Read MoreRead more about CVE-2022-28762: Zoom for macOS contains a debugging port misconfiguration
sl-abstract-neon-dice-casino-990x400-1
  • News

DiceyF deploys GamePlayerFramework in online casino development studio

October 18, 2022

The Hacktivity 2022 security festival was held at the MOM Cultural Center in Budapest, Hungary, over two days, October 6-7th...

Read MoreRead more about DiceyF deploys GamePlayerFramework in online casino development studio
osint
  • News

Retail giant Woolworths discloses data breach of MyDeal online marketplace

October 17, 2022

Australian retail giant Woolworths disclosed a data breach that impacted approximately 2.2 million MyDeal customers. Bad news for the customers...

Read MoreRead more about Retail giant Woolworths discloses data breach of MyDeal online marketplace
osint
  • News

New UEFI rootkit Black Lotus offered for sale at $5,000

October 17, 2022

Black Lotus is a new, powerful Windows UEFI rootkit advertised on underground criminal forums, researcher warns. Cybersecurity researcher Scott Scheferman...

Read MoreRead more about New UEFI rootkit Black Lotus offered for sale at $5,000
1f53a-1
  • News

Japanese tech firm Oomiya hit by LockBit 3.0. Multiple supply chains potentially impacted

October 17, 2022

The IT infrastructure of the Japanese tech company Oomiya was infected with the LockBit 3.0 ransomware. One of the affiliates...

Read MoreRead more about Japanese tech firm Oomiya hit by LockBit 3.0. Multiple supply chains potentially impacted
osint
  • Tools

JSubFinder – Searches Webpages For Javascript And Analyzes Them For Hidden Subdomains And Secrets

October 17, 2022

JSubFinder is a tool writtin in golang to search webpages & javascript for hidden Install Install the application and download...

Read MoreRead more about JSubFinder – Searches Webpages For Javascript And Analyzes Them For Hidden Subdomains And Secrets
osint
  • News

Bulgaria hit by a cyber attack originating from Russia

October 17, 2022

Government institutions in Bulgaria have been hit by a cyber attack during the weekend, experts believe it was launched by...

Read MoreRead more about Bulgaria hit by a cyber attack originating from Russia
1f4b8-1
  • News

Interpol arrested 75 members of the cybercrime ring Black Axe

October 17, 2022

Interpol has announced the arrests of 75 individuals as part of a coordinated international operation against an organized cybercrime ring...

Read MoreRead more about Interpol arrested 75 members of the cybercrime ring Black Axe
osint
  • News

45,654 VMware ESXi servers reached End of Life on Oct. 15

October 17, 2022

Lansweeper warns that over 45,000 VMware ESXi servers exposed online have reached end-of-life (EOL), making them an easy target for...

Read MoreRead more about 45,654 VMware ESXi servers reached End of Life on Oct. 15

Posts pagination

Previous 1 … 3,153 3,154 3,155 3,156 3,157 3,158 3,159 … 4,379 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-2697 – IBM – Cognos Command Center

August 26, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-1994 – IBM – Cognos Command Center

August 26, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5931 – wedevs – Dokan Pro

August 26, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9475 – SourceCodester – Human Resource Information System

August 26, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9476 – SourceCodester – Human Resource Information System

August 26, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel