Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

Better Call “Rey”

31006887484?profile=RESIZE_400x A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year by regularly stealing data from and publicly mass extorting dozens of major corporations.  But the tables seem to have turned somewhat for “Rey,” the moniker chosen by the technical operator and public face of the hacker group:  Last week, Rey confirmed his real life identity…

Read more…

Symbiote & BPFdoor Malware

31007098262?profile=RESIZE_400x eBPF (Extended Berkeley Packet Filter) is a very interesting kernel technology that lets users load tiny, sandboxed programs into the Linux kernel to inspect or modify network packets, system calls, and more.  The technology was introduced in 2015 to replace the “old” BPF technology of 1992, which was no longer compatible with modern computer architectures (e.g., 64-bit).  As usual,…

Read more…

Logins.Zip

31007497067?profile=RESIZE_400x Logins.zip is a new kind of computer malware that steals passwords and other private information from web browsers. A web browser is the program people use to go online like Chrome, Edge, or Brave. Many people save their passwords in their browser because it is convenient. Unfortunately, Logins.zip is designed to capture those stored passwords very quickly and…

Read more…
Views: 29
Comments: 0

Bad Calendars

31007088892?profile=RESIZE_400x In the modern digital ecosystem, subscribing to a calendar series has become a routine convenience.  Whether it is a retailer sharing dates for upcoming sales, a sports association like FIFA publishing match schedules, or a government body listing public holidays, the standard ‘ICS’ web calendar format, also known as iCalendars, allows third parties to integrate events directly into a…

Read more…

Kraken is Not only a Sea Monster

31006884097?profile=RESIZE_400x A series of big-game hunting incidents and double extortion attacks carried out by Kraken, a Russian-speaking operation that has emerged from the ashes of the HelloKitty cartel, was observed in August 2025 by Cisco Talos and detailed in an advisory published recently.  The group has been linked to intrusions where Server Message Block (SMB) flaws were abused for entry, followed using…

Read more…

Linux Mint v. Zorin OS

31004537881?profile=RESIZE_400x Zorin OS experienced a significant increase in downloads following the release of Windows 10.  Within a two-day stretch, Zorin OS had over 100,000 downloads, which was a record for the distribution.  Meanwhile, Linux Mint has been one of the most popular distributions for some time.  Given that both of these distributions are enjoying a continued rise in popularity, along with the end…

Read more…

AI & Payment Fraud

31007086892?profile=RESIZE_400x After years of quiet escalation, business leaders are finally beginning to grasp just how serious the threat of fraud has become.  Today, almost half of all fraud attempts (41%) involve artificial intelligence.  Nowhere is this more evident than in the payments industry.  Fraudsters can use AI to generate convincing fake invoices, purchase orders, and payment instructions that mirror…

Read more…

Honeypots, not the Honey Bear

31006592879?profile=RESIZE_400x What is a “honeypot” in the context of cybersecurity?  The term first appeared in the 1980s and 1990s, when it was used to describe precisely that, a honey trap that lured in unsuspecting hackers, putting them on the back foot.  Clifford Stoll’s 1989 book The Cuckoo’s Egg is the first official documentation of a honeypot in the cyber world. Stoll tells the story of using what he called…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT