Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

 

DDoS on Internet Archive

13028435864?profile=RESIZE_400x The Internet Archive has come back online, in slightly degraded mode, after repelling an 9 October DDoS attack and then succumbing to a raid on users' data.  For several days after the attack, the Archive loaded into the basic page depicted below.

Currently, it is seen that the site sometimes load that page, but sometimes load another that's closer to the Archive's usual busy…

Read more…

13029804065?profile=RESIZE_400x In today’s interconnected world, safeguarding critical infrastructure from cyber threats is more important than ever.  The continuous evolution of technology and the adoption of the Connected Worker have created unprecedented opportunities for growth and innovation.  However, they have also created a vast and complex digital landscape where vulnerabilities can be easily exploited.  The…

Read more…

RAMBO Doesn’t Give Up

13029781865?profile=RESIZE_400x A new attack technique that relies on radio signals from memory buses to exfiltrate data from air-gapped systems has been identified. The exploit is a novel side-channel attack that has been found to leverage radio signals emanated by a device's Random Access Memory (RAM) as a data exfiltration mechanism, posing a threat to air-gapped networks.  Air-gapped systems, typically used in…

Read more…

Ways You Can Detect Deepfakes

13028691497?profile=RESIZE_400x The US election cycle is here, and it is becoming more important for voters not to be fooled by Deepfakes.  According to recent research, just over half of Britons surveyed (53%) either have not heard of the term Deepfake or have misunderstood its meaning, with only 17% feeling confident in their ability to spot them.  Meanwhile, two in five have encountered at least one deepfake in…

Read more…

Hackers Send Putin a Birthday Present

13027365063?profile=RESIZE_400x Some television stations and websites in Russia are offline for the second day in a row following what Moscow called an “unprecedented” attack on its digital infrastructure.  The disruption began on October 7, Russian President Vladimir Putin’s birthday.  Last week, Russian state-owned broadcaster VGTRK’s website and digital streaming services went off the air.  The affected outlets…

Read more…

Grid Security – Who’s Responsible??

13023981683?profile=RESIZE_400x It is not the federal government that’s responsible for the cyber defense of critical infrastructure.  The responsibility falls on the critical infrastructure operators themselves and most aren’t equipped for the fight.  Cyber threats to the United States' critical infrastructure are on the rise.  On 31 January 2024, FBI Director Christopher Wray testified before Congress, highlighting…

Read more…

Hackers Join the Ecosystem 12 Club

13027416478?profile=RESIZE_400x Despite current of law enforcement action to take down ransomware gangs, Secureworks has observed a 30% year-on-year rise in active ransomware groups.   In the eighth edition of the Secureworks annual State of The Threat Report[1], the firm identified 31 new groups that had entered the ransomware ecosystem in the last 12 months.  The report noted that while a few…

Read more…

Car Attacks

13024026055?profile=RESIZE_400x In today’s world, cars are not just machines that take us from one place to another. They have transformed computers into wheels, packed with technology for navigation, entertainment, and safety. However, this technology also comes with a dark side: cyber-attacks.  As vehicles become more connected through the Internet of Things (IoT), they are increasingly vulnerable to hackers.…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT