Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

US Hiring Offensive Mercenaries

31040394278?profile=RESIZE_400x The US government wants to use private firms to conduct offensive cyberattacks against foreign adversaries, potentially escalating electronic conflict, which is currently often carried out by secretive intelligence agencies.   The White House plans to make public its intention to enlist private companies in more aggressive efforts to go after criminal and state-sponsored hackers in a…

Read more…

A Look Back at 2025

31039540075?profile=RESIZE_400x The past year of 2025 has seen an unprecedented number of cyber-attacks targeting large enterprises and globally recognized brands.  Among the major trends Infosecurity reported on in 2025, their analysts saw organized ransomware groups and more nebulous collectives of teenager hackers alike manage to break into systems using clever but often unsophisticated tactics.  Additionally, we…

Read more…

Happy Holidays

31040384276?profile=RESIZE_400x Saint Nicholas, known as the patron saint of children and sailors, was born in the third century in the town of Patara, in present-day Turkey.  Renowned for his generosity and compassion, Nicholas dedicated his life to helping those in need, often performing acts of kindness in secret.  The most famous story tells how he tossed bags of gold through a poor family's window at night to…

Read more…

Phishing with Spiderman

31040392494?profile=RESIZE_400x A sophisticated phishing toolkit named Spiderman has emerged on the dark web, enabling cybercriminals to mimic login pages of central European banks and cryptocurrency exchanges without requiring coding knowledge.  Sold as a ready-to-use package, the kit lowers barriers for fraudsters, allowing rapid deployment of deceptive campaigns that harvest sensitive credentials in real time. …

Read more…

Silicon Valley's Greed

31040380055?profile=RESIZE_400x Giving businesses the freedom to do their thing while we maintain national security is much more difficult than it looks.  Two stories from last week show how much harder it is.  For two decades now, the jewels of our industry have been vanishing or turning red.  In their different ways, iRobot and ASML shed light on a crisis no one really wants to acknowledge.

Last week, iRobot…

Read more…

Oracle in Michigan

31039561495?profile=RESIZE_400x A slogan for the State of Michigan presents, “Say Yes to Michigan.”  Well saying yes is easier than it appears.  Plans for a massive new Oracle data center in the US State of Michigan have been left in limbo after funding talks with its key financial partner broke down.  As reported by the Financial Times, Blue Owl Capital, which has backed some of Oracle's largest data center…

Read more…

Turning Light into Touch

31040391480?profile=RESIZE_400x The question was deceptively simple.  Could the light that is used to form an image on a display also be converted into something that can be felt?  At the University of California - Santa Barbara, a team of researchers spent nearly a year exploring this idea, working through theoretical models, conducting simulations, and eventually building prototypes.  Their work, described in the…

Read more…

31040395500?profile=RESIZE_400x SentinelLABS has been researching how large language models (LLMs) are impacting cybersecurity for both defenders and adversaries.  As part of our ongoing efforts in this area and our well-established research and tracking of crimeware actors, researchers have been closely following the adoption of LLM technology among ransomware operators.  Analysts have observed that three structural…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT