Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Forensic Analysis Unlocked A Practical Guide for Cybersecurity Investigators

October 27, 2025
unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025
unlock_membership
  • Premium Members Content

Fortifying the Supply Chain through Practical Security for Modern Organizations

September 22, 2025
unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – c4951ce5e946596e0356979341e6f240

October 21, 2022

Score: 7 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: c4951ce5e946596e0356979341e6f240SHA1: 530e602b959009f80b5161aeb0eaec7c75dfd826ANALYSIS DATE: 2022-10-21T10:54:03ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...

Read MoreRead more about Malware Analysis – ransomware – c4951ce5e946596e0356979341e6f240
CVE-prog
  • Vulnerabilities

F5 BIG-IP (Advanced WAF, ASM) code execution | CVE-2022-41617

October 21, 2022

NAME F5 BIG-IP (Advanced WAF, ASM) code execution Platforms Affected:F5 BIG-IP (ASM) 14.1.0 F5 BIG-IP (ASM) 13.1.0 F5 BIG-IP (ASM)...

Read MoreRead more about F5 BIG-IP (Advanced WAF, ASM) code execution | CVE-2022-41617
CVE-prog
  • Vulnerabilities

HelpSystems Cobalt Strike code execution | CVE-2022-42948

October 21, 2022

NAME HelpSystems Cobalt Strike code execution Platforms Affected:HelpSystems Cobalt Strike 4.7.1Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION HelpSystems Cobalt Strike could allow a...

Read MoreRead more about HelpSystems Cobalt Strike code execution | CVE-2022-42948
osint
  • News

News URSNIF variant doesn’t support banking features

October 21, 2022

A new variant of the popular Ursnif malware is used as a backdoor to deliver next-stage payloads and steal sensitive...

Read MoreRead more about News URSNIF variant doesn’t support banking features
trend-16
  • Vulnerabilities

Daily Vulnerability Trends: Fri Oct 21 2022

October 21, 2022

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-41852Those using JXPath to interpret untrusted XPath expressions may be vulnerable to...

Read MoreRead more about Daily Vulnerability Trends: Fri Oct 21 2022
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: eeckman[.]eu

October 21, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: eeckman[.]eu
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: eureka-puzzle[.]eu

October 21, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: eureka-puzzle[.]eu
osint
  • News

Healthcare system Advocate Aurora Health data breach potentially impacted 3M patients

October 21, 2022

Healthcare system Advocate Aurora Health (AAH) disclosed a data breach that exposed the personal data of 3,000,000 patients. The US-based...

Read MoreRead more about Healthcare system Advocate Aurora Health data breach potentially impacted 3M patients
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – cf711afc5eca3498429bb1422b41d7a5

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: cf711afc5eca3498429bb1422b41d7a5SHA1: 364304eb925d2702c123736c16ab07e9d10dcf6dANALYSIS DATE: 2022-10-21T01:58:03ZTTPS: T1012, T1082, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – cf711afc5eca3498429bb1422b41d7a5
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – evasion – 7566b7d7a5839725c9c64961a0c8b920

October 21, 2022

Score: 9 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomwareMD5: 7566b7d7a5839725c9c64961a0c8b920SHA1: 1c580b6f7f3276e68cbccaf4e0857ec490fe6775ANALYSIS DATE: 2022-10-20T06:11:45ZTTPS: T1490, T1060, T1112 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – evasion – 7566b7d7a5839725c9c64961a0c8b920
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 67539d1128a73ced00a692b4f3bdd401

October 21, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: 67539d1128a73ced00a692b4f3bdd401SHA1: d7a945d19f1c6d2c9cd8c27ee81e5f0a76579068ANALYSIS DATE: 2022-10-21T02:00:27ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091, T1060, T1112...

Read MoreRead more about Malware Analysis – persistence – 67539d1128a73ced00a692b4f3bdd401
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – d40382764d622393e1a1bb318c43b5e8

October 21, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: d40382764d622393e1a1bb318c43b5e8SHA1: e3b59e16efdb0843e0e195dc67b305201602ee02ANALYSIS DATE: 2022-10-21T02:07:06ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – d40382764d622393e1a1bb318c43b5e8
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 476635a30e84fa5142f3b0258807cdc1

October 21, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 476635a30e84fa5142f3b0258807cdc1SHA1: 48e256b43da8ae4a2dc4f788d1e8e60ba6a5efc3ANALYSIS DATE: 2022-10-21T02:05:03ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 476635a30e84fa5142f3b0258807cdc1
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – d01e1338a1c7a2aa61733ef47a7ac35d

October 21, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: d01e1338a1c7a2aa61733ef47a7ac35dSHA1: 966185c9056e67418f987dbc892d948e908f1802ANALYSIS DATE: 2022-10-21T02:01:05ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – d01e1338a1c7a2aa61733ef47a7ac35d
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – e3ab48a33e6c51a9585255a0a0170830

October 21, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: e3ab48a33e6c51a9585255a0a0170830SHA1: 278f874f675777f9b22837202eba8ac4164835eaANALYSIS DATE: 2022-10-21T02:13:09ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – e3ab48a33e6c51a9585255a0a0170830
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – f7788b8b55dc237a0e70a76712cd67b8

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: f7788b8b55dc237a0e70a76712cd67b8SHA1: 77b729ddebfdf4c258fca4dedeabdeb0c4b26c32ANALYSIS DATE: 2022-10-21T02:44:32ZTTPS: T1053, T1005, T1081, T1012,...

Read MoreRead more about Malware Analysis – djvu – f7788b8b55dc237a0e70a76712cd67b8
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 6711fe2dd09ebaa38866fd2347707c5c

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, stealerMD5: 6711fe2dd09ebaa38866fd2347707c5cSHA1: eb2788616697987a23aa49421e26c9aacc1742a3ANALYSIS DATE: 2022-10-21T02:38:04ZTTPS: T1222, T1060, T1112, T1082, T1012,...

Read MoreRead more about Malware Analysis – djvu – 6711fe2dd09ebaa38866fd2347707c5c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – dd8ebe57e3ae851a6bc1c6b34067ea21

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: dd8ebe57e3ae851a6bc1c6b34067ea21SHA1: 0a48af08cfcbebd2af414e4e0780608ae8885d4cANALYSIS DATE: 2022-10-21T02:48:11ZTTPS: T1005, T1081, T1012, T1082,...

Read MoreRead more about Malware Analysis – djvu – dd8ebe57e3ae851a6bc1c6b34067ea21
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – c629d6f58117d412173063ef636e6b65

October 21, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: c629d6f58117d412173063ef636e6b65SHA1: 46c77ccde087080cb5ade178f10e813d48dac71bANALYSIS DATE: 2022-10-21T03:06:13ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – c629d6f58117d412173063ef636e6b65
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 5ff5c285649abf718cc88f492b75df44

October 21, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 5ff5c285649abf718cc88f492b75df44SHA1: 316d2ce2d6499874f675c82e0fc5b8bd3ac99bd6ANALYSIS DATE: 2022-10-21T03:32:01ZTTPS: T1222, T1053, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 5ff5c285649abf718cc88f492b75df44
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 45c256105d08937f2a5571b8a7827809

October 21, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 45c256105d08937f2a5571b8a7827809SHA1: 3228405c3507538b2417bf522b0c1e9343fdd58bANALYSIS DATE: 2022-10-21T03:33:03ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 45c256105d08937f2a5571b8a7827809
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – d194ae52fbd0d872391c1bd4cdfe9af9

October 21, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: d194ae52fbd0d872391c1bd4cdfe9af9SHA1: c1979f22c4c146922923b682d395212cd8a7a89cANALYSIS DATE: 2022-10-21T03:20:20ZTTPS: T1005, T1081, T1082, T1107, T1490, T1091, T1060, T1112...

Read MoreRead more about Malware Analysis – persistence – d194ae52fbd0d872391c1bd4cdfe9af9
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – persistence – 48a90ac8127abfd31c44ffcb0feccb79

October 21, 2022

Score: 9 MALWARE FAMILY: persistenceTAGS:persistence, ransomware, spyware, stealerMD5: 48a90ac8127abfd31c44ffcb0feccb79SHA1: 8a1ffd8215b73fc85999f837ff275430f3062186ANALYSIS DATE: 2022-10-21T03:40:18ZTTPS: T1082, T1107, T1490, T1091, T1060, T1112, T1005, T1081...

Read MoreRead more about Malware Analysis – persistence – 48a90ac8127abfd31c44ffcb0feccb79
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – ransomware – ca5e0ee1274f175f5843e669ec94045e

October 21, 2022

Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: ca5e0ee1274f175f5843e669ec94045eSHA1: 56064940ef17dffdb84f4527e982f9523ff832efANALYSIS DATE: 2022-10-21T04:00:21ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...

Read MoreRead more about Malware Analysis – ransomware – ca5e0ee1274f175f5843e669ec94045e

Posts pagination

Previous 1 … 3,239 3,240 3,241 3,242 3,243 3,244 3,245 … 4,484 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Henrietta Ezeoke Law Firm

October 27, 2025
image
  • Data Breach
  • Ransomware

[CLOP] – Ransomware Victim: HARVARD[.]EDU

October 27, 2025
image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: Cooperativa Esercenti Farmacia Scrl

October 27, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-12238 – code-projects – Automated Voting System

October 27, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-12259 – TOTOLINK – A3300R

October 27, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel