Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

PureLogs

31152894263?profile=RESIZE_400x The use of steganography in the threat landscape continues to accelerate. Threat actors are increasingly shifting from direct encrypted transfers to a 'legitimate-file-plus-hidden-data' model, effectively masking their next-stage payloads within everyday media.

FortiGuard Labs recently uncovered a phishing campaign that abuses environment variables to hide malicious commands and…

Read more…

Ledger Hardware

31153203701?profile=RESIZE_400x Crypto wallet owners using Ledger hardware wallets are being targeted through physical mail, with scammers impersonating the company in a campaign designed to steal recovery seed phrases.  The operation uses printed letters that look official, complete with Ledger branding, a reference number, and a fake security notice warning recipients about an urgent “Quantum Resistance”…

Read more…

31151147680?profile=RESIZE_400x Cybersecurity researchers at Point Wild recently found a new way that cyber-attackers are gaining unauthorized access to computers.  The investigation, led by experts Kedar Shashikant Pandit, Prathamesh Shingare, and Amol Swami from the Lat61 Threat Intelligence Team, reveals that a common tool used by legitimate developers is being…

Read more…

DDoS Protection in Brazil

31148720501?profile=RESIZE_400x A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned.  The firm’s chief executive says the malicious activity resulted from a security breach and was likely carried out…

Read more…

31150193893?profile=RESIZE_400x Potholes, or some say chuck holes, are a troublesome problem.  Just ask scooter company Lime, which listed them as an official risk to its business in its recent IPO filing.  History is littered with claims that technology can help solve or blunt the problem of potholes, and still they persist. But as cars become increasingly laden with advanced sensors, they are becoming a tool that…

Read more…

Android’s Intrusion Logging

31148970893?profile=RESIZE_400x Google is rolling out a new opt-in feature in Android that aims to help security researchers investigate spyware attacks.  The feature is called “Intrusion Logging” and is part of Android’s Advanced Protection Mode, which Google launched last year, an opt-in special security mode that enables certain features with the goal of making the device harder to hack.  Advanced Protection Mode…

Read more…

SMBs Choosing Automated Defense 0ver AI

31148719058?profile=RESIZE_400x In the cybersecurity world, we often assume that small and medium-sized businesses (SMBs) are the lagging indicators of digital maturity.  But new research from Tech.co and Expert Market suggests that SMB leaders are becoming surprisingly surgical in their tech adoption.  The data reveal a major pivot in 2026: while many organizations are pulling back AI for general business tasks,…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT