Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

IngressNightmare Vulnerability

13533156863?profile=RESIZE_400x As more organizations adopt containerization, Kubernetes adoption is at an all-time high. A key component of any Kubernetes cluster is allowing and managing external traffic to the services organizations are building. Enter Ingress. As a powerful component and set of resources that expose services to the outside world, Ingress’s power and complexity lend themselves to a considerable…

Read more…

RolandSkimmer

13532510277?profile=RESIZE_400x Web-based credit card skimming remains a widespread and persistent threat, known for its ability to adapt and evolve over time.  FortiGuard Labs recently observed a sophisticated campaign called “RolandSkimmer,” named after the unique string “Rol@and4You” found embedded in its payload.  This threat actor targets users in Bulgaria and represents a new wave of credit card skimming…

Read more…

13532383276?profile=RESIZE_400x Another vulnerability impacting firewall products from Ivanti is being exploited by alleged China-based hackers.  An Ivanti advisory released last week confirmed that a “limited number of customers”  have been attacked through a bug impacting its Connect Secure, Policy Secure & ZTA Gateways tools, which are used by large organizations and government clients to keep malicious…

Read more…

North Korea - Creating More Mischief

13533050692?profile=RESIZE_400x The Google Threat Intelligence team (GTIG) has published new research outlining how IT workers from the Democratic People's Republic of Korea (DPRK) are expanding the scope and scale of their operations, targeting companies across the globe with more advanced deception and cyber extortion tactics. The report offers a stark reminder that nation-state threats do not always originate with…

Read more…

What is Fast Flux ???

13531889083?profile=RESIZE_400x A technique that hostile nation-states and financially motivated ransomware groups are using to hide their operations poses a threat to critical infrastructure and national security, the National Security Agency has warned.

The technique is known as fast flux.  It allows decentralized networks operated by threat actors to hide their infrastructure and survive takedown attempts…

Read more…

13531885283?profile=RESIZE_400x Water and electricity utilities across the US and UK face an intensifying wave of cyberattacks, many of them linked to nation-state actors, according to a new report by cybersecurity firm Semperis.  The findings, drawn from a survey of 350 utility sector IT and security professionals, reveal an urgent need for greater operational resilience and leadership support as threats multiply. …

Read more…

OpenSNP Genetic Repository

13529352052?profile=RESIZE_400x OpenSNP, a large open-source repository for user-uploaded genetic data, will shut down and delete all of its data at the end of April, co-founder Bastian Greshake Tzovaras has confirmed.  In a blog post, openSNP’s Greshake Tzovaras attributed the decision to shut down the site due to concerns of data privacy …

Read more…

Identity-Based Cyber Attacks

13529675873?profile=RESIZE_400x A new report out today from Cisco Talos, a cybersecurity company part of Cisco Systems Inc., found that in 2024, cybercriminals didn’t need zero-days or custom malware to wreak havoc: They just logged in. Identity-based attacks, misused legitimate tools, and years-old vulnerabilities drove the majority of security incidents last year.

The findings come from the Talos 2024 Year…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT