Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025
unlock_membership
  • Premium Members Content

Fortifying the Supply Chain through Practical Security for Modern Organizations

September 22, 2025
unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 51[.]178[.]11[.]176:443

October 27, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 51[.]178[.]11[.]176:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 167[.]99[.]217[.]14:80

October 27, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 167[.]99[.]217[.]14:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 121[.]4[.]132[.]216:80

October 27, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 121[.]4[.]132[.]216:80
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – b4fa7b82c6a344a23b4a520b58241f8c

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: b4fa7b82c6a344a23b4a520b58241f8cSHA1: fb940e05a70f7c47c1756ada2ce6bbf4fbd175e1ANALYSIS DATE: 2022-10-27T10:40:32ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – b4fa7b82c6a344a23b4a520b58241f8c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 4f3c30245d9e71db55a8d59eb4a3f0b9

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 4f3c30245d9e71db55a8d59eb4a3f0b9SHA1: 19e45a85adac1bd5eee04e683f8ea8e02dae42b8ANALYSIS DATE: 2022-10-27T10:40:28ZTTPS: T1107, T1490, T1091, T1005, T1081, T1082 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 4f3c30245d9e71db55a8d59eb4a3f0b9
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 3aee6dfb793b90415046c55728e03fcb

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 3aee6dfb793b90415046c55728e03fcbSHA1: 0e0c59a7f835aa33fdd56f4500b3a8d732e13bc3ANALYSIS DATE: 2022-10-27T10:40:19ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 3aee6dfb793b90415046c55728e03fcb
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – c1d45de8eedca095a1b4bbc87ca30edf

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: c1d45de8eedca095a1b4bbc87ca30edfSHA1: 6c298fa8d903836b42114423131a63834af9252fANALYSIS DATE: 2022-10-27T10:40:23ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – c1d45de8eedca095a1b4bbc87ca30edf
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – 013636f2335ee89b25cd923f75d5e38d

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 013636f2335ee89b25cd923f75d5e38dSHA1: 466abfaaeb5eea578588160e4cba408e401e77c9ANALYSIS DATE: 2022-10-27T10:40:45ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – 013636f2335ee89b25cd923f75d5e38d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – e5482be8c4cf530f0b801fc7beeaa5c7

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: e5482be8c4cf530f0b801fc7beeaa5c7SHA1: 2e705f86fc0a7acc3bdd1518dd403650f2ab40abANALYSIS DATE: 2022-10-27T10:40:36ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – e5482be8c4cf530f0b801fc7beeaa5c7
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 1be5c06e51392d4039230172194537af

October 27, 2022

Score: 10 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomware, spyware, stealerMD5: 1be5c06e51392d4039230172194537afSHA1: 7aca4262621e563e207e8cb2a6bbfd8ab48b0b12ANALYSIS DATE: 2022-10-27T10:55:30ZTTPS: T1060, T1112, T1070, T1005, T1081, T1012, T1082...

Read MoreRead more about Malware Analysis – evasion – 1be5c06e51392d4039230172194537af
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – cc81f0cdefab1bd25dc1e2ddfe316440

October 27, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: cc81f0cdefab1bd25dc1e2ddfe316440SHA1: 4dae9abc021c7011fa364d4749fac76fa9fd38eaANALYSIS DATE: 2022-10-27T10:40:40ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – cc81f0cdefab1bd25dc1e2ddfe316440
phone-mobile-apps
  • NCSC
  • News

Using secure messaging, voice and collaboration apps

October 27, 2022

Using secure messaging, voice and collaboration apps With 'hybrid working' (a combination of working from home and the office) now...

Read MoreRead more about Using secure messaging, voice and collaboration apps
edinburgh-g0fc4f9652_640-Copy
  • NCSC
  • News

Why vulnerabilities are like buses

October 27, 2022

Why vulnerabilities are like buses There's an old saying that you wait ages for a bus, and then several come...

Read MoreRead more about Why vulnerabilities are like buses
BoardMeeting-Copy
  • NCSC
  • News

Log4j vulnerability: what should boards be asking?

October 27, 2022

Log4j vulnerability: what should boards be asking? The Log4Shell critical vulnerability in the widely used logging tool Log4j has caused concern...

Read MoreRead more about Log4j vulnerability: what should boards be asking?
fibre-optic-cables
  • NCSC
  • News

Cyber Security in the Built Environment – considering security throughout a buildings lifecycle

October 27, 2022

Cyber Security in the Built Environment - considering security throughout a buildings lifecycle A building being designed today is, as...

Read MoreRead more about Cyber Security in the Built Environment – considering security throughout a buildings lifecycle
online-transactions
  • NCSC
  • News

‘Transaction monitoring’ & ‘Building and operating a secure online service’ guidance published

October 27, 2022

'Transaction monitoring' & 'Building and operating a secure online service' guidance published If you're responsible for the designing and running...

Read MoreRead more about ‘Transaction monitoring’ & ‘Building and operating a secure online service’ guidance published
technology-assurance-main
  • NCSC
  • News

The Technology Assurance principles

October 27, 2022

The Technology Assurance principles In this blog post I want to introduce a new family of principles, the Technology Assurance...

Read MoreRead more about The Technology Assurance principles
glass-walkway-mountains
  • NCSC
  • News

Zero Trust migration: where do I start?

October 27, 2022

Zero Trust migration: where do I start? Following our ‘Zero Trust: is it right for me?' blog, this second installment...

Read MoreRead more about Zero Trust migration: where do I start?
caf-3.1
  • NCSC
  • News

The Cyber Assessment Framework 3.1

October 27, 2022

The Cyber Assessment Framework 3.1 This latest version of the Cyber Assessment Framework (CAF), 3.1, supports the CAF's core users -...

Read MoreRead more about The Cyber Assessment Framework 3.1
acd_year5
  • NCSC
  • News

ACD the 5th Year: report now available to download

October 27, 2022

ACD the 5th Year: report now available to download The aim of the NCSC's Active Cyber Defence (ACD) programme is...

Read MoreRead more about ACD the 5th Year: report now available to download
key-1798-shop-sign
  • NCSC
  • News

Mythbusting cloud key management services

October 27, 2022

Mythbusting cloud key management services The NCSC’s recently-updated cloud security guidance includes a new section on how to configure and...

Read MoreRead more about Mythbusting cloud key management services
supporting_staff
  • NCSC
  • News

Avoiding crisis mismanagement

October 27, 2022

Avoiding crisis mismanagement Every day, an eclectic range of cyber attacks take place across the UK. No two attacks are...

Read MoreRead more about Avoiding crisis mismanagement
cloud-launch
  • NCSC
  • News

Relaunching the NCSC’s Cloud security guidance collection

October 27, 2022

Relaunching the NCSC's Cloud security guidance collection This week we have launched the updated NCSC’s cloud security guidance. It’s more...

Read MoreRead more about Relaunching the NCSC’s Cloud security guidance collection
soc-101
  • NCSC
  • News

New SOC guidance 101

October 27, 2022

New SOC guidance 101 Security operations centres (or SOCs) are notoriously difficult to design, build and operate. But they're also...

Read MoreRead more about New SOC guidance 101

Posts pagination

Previous 1 … 3,202 3,203 3,204 3,205 3,206 3,207 3,208 … 4,480 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

fb829fa8a8b2cc129abe2eeccbfc0e0934a44d5f6938a4c8d6866aeda3234152
  • News

Shield Ai Shows Off Not At All Terrifying Autonomous Vtol Combat Drone

October 26, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Essential Cabinetry Group

October 26, 2025
image
  • Data Breach
  • Ransomware

[NOVA] – Ransomware Victim: Papsud

October 26, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]35[.]223[.]90:443

October 26, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]152[.]99[.]85:443

October 26, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel