PLUGGYAPE Malware Targets Ukrainian Defense via Signal and WhatsApp
cert-ua has disclosed that there is a cyberespionage campaign against the Ukrainian military that ran from October to December 2025, with a distinct malwar...
Expert analysis, threat intelligence, and practical guidance from Red Secure Tech's security specialists — covering penetration testing, vulnerability assessment, incident response, and secure development for UK businesses.
cert-ua has disclosed that there is a cyberespionage campaign against the Ukrainian military that ran from October to December 2025, with a distinct malware called "pluggy ape" which has not been docu...
Read Full Articlecert-ua has disclosed that there is a cyberespionage campaign against the Ukrainian military that ran from October to December 2025, with a distinct malwar...
Since January 2022, cybersecurity researchers have discovered an ongoing web skimming operation targeting businesses associated with some of the largest gl...
When a hacker changes the email on your account, it’s not just an inconvenience.Email controls password resets, alerts, and account recovery.Once it&...
An online impersonation occurs when someone creates an account or posts as if they were you on the internet.Examples of Online Impersonation:1. They could...
Many modern applications ship large JavaScript bundles to every user.Inside those bundles are often features meant only for administrators:internal dashboa...
Most damage from a hack doesn’t happen instantly.It happens because people don’t realize what’s happening, or they freeze.The first 10 mi...
Our blog insights are backed by hands-on service delivery. Whether you need a penetration test, vulnerability assessment, emergency website recovery, or secure web development — our UK cybersecurity specialists are ready to help.
Emergency malware removal, backdoor elimination, blacklist delisting, and full post-incident hardening for compromised websites.
Authorised simulated attacks exposing real vulnerabilities in your web applications, networks, and infrastructure before attackers do.
Systematic identification and prioritisation of security weaknesses across your digital estate — with actionable remediation guidance.
OWASP-aligned web application development with security engineered in from architecture through to penetration-tested deployment.
Advanced adversary simulation testing your organisation's detection and response capabilities against real-world threat actor behaviour.
Actionable intelligence on threat actors, attack vectors, and emerging risks targeting your sector — enabling proactive defensive decisions.
© 2016 – 2026 Red Secure Tech Ltd. Registered in England and Wales — Company No: 15581067