Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

2026 – Things to Watch

31050168091?profile=RESIZE_400x 2026 is a pivotal juncture for cyber security.  What was once considered an operational safety net and a business cost item is now a determinant of long-term competitiveness, market confidence, and organizational resilience.  The data unequivocally indicates that cyber danger is systemic rather than episodic.

Cybersecurity Ventures estimates that cybercrime lost $10.5 trillion…

Read more…

Hospitality Sector & the DCRat Payload

31053915075?profile=RESIZE_400x Securonix threat researchers have been tracking a stealthy campaign targeting the hospitality sector that uses click-fix social engineering, fake captchas, and fake blue screens of death to trick users into pasting malicious code.  It leverages a trusted MSBuid.exe tool to bypass defenses and deploys a stealthy, Russian-linked DCRat payload for full remote access and the ability to…

Read more…

Crime Does Not Pay

31053861300?profile=RESIZE_400x Two US cybersecurity professionals, Ryan Goldberg and Kevin Martin, pleaded guilty to charges tied to their roles in BlackCat/Alphv ransomware attacks that occurred in 2023.  Court records show that Ryan Goldberg, Kevin Martin, and a co-conspirator deployed ALPHV BlackCat ransomware against US victims from April to December 2023, sharing 20% of the ransoms with the operators.  Despite…

Read more…

What is The Com?

31050142452?profile=RESIZE_400x The job posts do not immediately raise alarms, even though they’re clearly not for tutoring or babysitting.   “Female candidates are a PRIORITY, even if you aren’t from US, if you do not have a clear accent please feel free to inquire,” a public Telegram channel post from 15 December.  “INEXPERIENCED people are OKAY, we can train you from scratch, but we expect you to absorb…

Read more…

 

12057871866?profile=RESIZE_400x Red Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky…

Read more…

Bitcoin ATM Fraud

31049939500?profile=RESIZE_400x The Federal Bureau of Investigation said fraudsters in 2025 bilked Americans out of more than $333 million with ruses perpetrated by using Bitcoin ATM machines (BTM), a marked uptick over previous years as the popularity of cryptocurrencies continues to grow.

A BTM, or Bitcoin ATM, is an automated kiosk that allows individuals to buy or sell bitcoin and other cryptocurrencies…

Read more…

Five Cyber Threats that Defined Security in 2025

31052929477?profile=RESIZE_400x 2025 marked yet another busy year in security, between big attacks, government shakeups, and dangerous flaws that echo of the past.  The moments that defined this year were impactful but felt evenly spread across the year.  Early in 2025, we observed the China-nexus advanced persistent threat (APT) Salt Typhoon continuing its assault against telecom companies as part of its espionage…

Read more…

When Machines Talk

31052928272?profile=RESIZE_400x Every time a computer performs a task, an invisible conversation unfolds inside it. Numbers move between memory and processor, circuits signal one another, and layers of software exchange instructions.  These interactions feel instantaneous and effortless, yet behind the scenes, they carry a real energetic price.  For decades, scientists believed that communication inside a machine…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT