Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

The Importance of Supply-Chain Security

13758240872?profile=RESIZE_400x Companies should improve the resilience of their software supply chains against ransomware, according to guidance the International Counter Ransomware Initiative (CRI) published recently after its fifth annual summit in Singapore.  The new guidance, developed by the United Kingdom and Singapore as the CRI’s policy leads, aims to raise awareness of the ransomware threat across supply…

Read more…

AI Browser Agents and Prompt Injection Attacks

13761558060?profile=RESIZE_400x New AI-powered web browsers, such as OpenAI’s ChatGPT Atlas and Perplexity’s Comet, are attempting to unseat Google Chrome as the primary gateway to the Internet for billions of users.  A key selling point of these products is their web browsing AI agents, which promise to complete tasks on a user’s behalf by navigating websites and filling out forms.  However, consumers may not be…

Read more…

13758034869?profile=RESIZE_400x For decades, online security has relied on cryptographic systems that are robust against classical computers.  But quantum computing changes the game.  It threatens to undermine the mathematical foundations of widely used encryption methods, exposing sensitive data captured today to future decryption and exploitation.  This looming threat has catalyzed a global effort to build…

Read more…

Myanmar Scam Compounds Shutdown by SpaceX

13758236464?profile=RESIZE_400x SpaceX says it has disabled more than 2,000 Starlink devices connected to scam compounds in Myanmar after politicians and others called on the company to crack down on scammers using its kits for fast satellite internet.  The vice-president of Starlink’s business operations, said in a post on X last week that the company “proactively identified and disabled over 2,500 Starlink Kits in…

Read more…

Mobile Phones & Data Breaches

13758199686?profile=RESIZE_400x Professionals have ignored cybersecurity on their phones.  Instead of compensating for that, organizations are falling into the very same trap, even though available security options could cut smishing success and breaches in half.  Enterprise cybersecurity risks from employees using their personal phones for work are rising, but companies aren't adopting solutions quickly enough to…

Read more…

EtherHiding Hiding its Malware

13758032079?profile=RESIZE_400x Google’s Threat Intelligence Group (GTIG) has warned that at least two hacking groups are exploiting public blockchains to conceal and control malware, using a technique called “EtherHiding” that turns decentralized ledgers into resilient command-and-control (C2) infrastructure.  GTIG reports it has observed the North Korean (DPRK) threat actor UNC5342, also known as BeaverTail,…

Read more…

AI & Identity Hacking

13757995072?profile=RESIZE_400x Microsoft’s Digital Defense Report 2025[1] warns of a marked increase in identity-based attacks, driven in part by the growing use of artificial intelligence to craft convincing social engineering lures.  The company says its systems analyze more than 100 trillion security signals every day and that identity attacks rose 32% in the first half of 2025 compared with…

Read more…

13751891466?profile=RESIZE_400x A new report from security researchers details the activities of ‘Jingle Thief’, a financially motivated threat group that operates almost entirely in cloud environments to conduct large-scale gift card fraud.  Active since at least 2021, the group targets retail and consumer services organizations through phishing and smishing campaigns designed to steal Microsoft 365 credentials.…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT