Category: Threat Intel Reports


  • Using TLS to protect data

    guidance ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Download.9707f7cfb011873c42d284fb1469de73.svg) Download / Print article PDF ##### ShareCopied to clipboard ##### Share![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)##### Facebook![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)##### Linkedin![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)##### X![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)##### Copy LinkCopied to clipboard…


  • Decrypting diversity: Diversity and inclusion in cyber security report 2020

    | ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Chevron_blue_up-CA.0731190020f3afd1faf8227c16c32bfd.svg) | Back to top | Copied to clipboard || ##### Share|| ![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)|| ##### Facebook|| ![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)|| ##### Linkedin|| ![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)||…


  • What’s happened to my data

    | ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Chevron_blue_up-CA.0731190020f3afd1faf8227c16c32bfd.svg) | Back to top | Copied to clipboard || ##### Share|| ![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)|| ##### Facebook|| ![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)|| ##### Linkedin|| ![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)||…


  • Applying the Cloud Security Principles in practice: a case study

    | ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Chevron_blue_up-CA.0731190020f3afd1faf8227c16c32bfd.svg) | Back to top | Copied to clipboard || ##### Share|| ![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)|| ##### Facebook|| ![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)|| ##### Linkedin|| ![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)||…


  • Cyber Resilience Audit scheme open to applications

    | ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Chevron_blue_up-CA.0731190020f3afd1faf8227c16c32bfd.svg) | Back to top | Copied to clipboard || ##### Share|| ![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)|| ##### Facebook|| ![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)|| ##### Linkedin|| ![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)||…


  • Remote Monitoring and Management (RMM) Tooling Increasingly an Attackers First Choice

    Threat actors are increasingly using legitimate remote monitoring and management (RMM) tools as initial payloads in email campaigns. This trend…


  • Desert Dexter.Attacks on Middle Eastern Countries

    A malicious campaign targeting residents of Middle East and North Africa has been discovered, active since September 2024. The attackers…


  • [PLAY] – Ransomware Victim: Clawson Honda

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[PLAY-] — Ransomware Victim: Clawson Honda============================================[March 9, 2025](https://www.redpacketsecurity.com/2025/03/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[PLAY] – Ransomware Victim: Clawson Honda 1’)Ransomware Group:…


  • [PLAY] – Ransomware Victim: Yorke & Curtis

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[PLAY-] — Ransomware Victim: Yorke -& Curtis==============================================[March 9, 2025](https://www.redpacketsecurity.com/2025/03/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[PLAY] – Ransomware Victim: Yorke & Curtis…


  • [PLAY] – Ransomware Victim: Holiday Comfort

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[PLAY-] — Ransomware Victim: Holiday Comfort==============================================[March 9, 2025](https://www.redpacketsecurity.com/2025/03/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[PLAY] – Ransomware Victim: Holiday Comfort 1’)Ransomware Group:…