Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

12057871866?profile=RESIZE_400x Red Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is…

Read more…

31095042494?profile=RESIZE_400x Drones have emerged as a significant security concern for US military bases and critical infrastructure.  These unmanned systems are typically low-cost, simple to operate, and difficult to detect using traditional air-defense sensors.  A single drone can be deployed for surveillance, smuggling, or disruption, creating a scenario where security forces must respond swiftly without…

Read more…

Who are You (& Why are You Here)?

31095045100?profile=RESIZE_400x In the 1980’s the rock group The Who, had a hit song: ‘Who are You.”  That was rock’n’roll, but what is happening now is a question of, “Is it Real, or is it Fake?”  Who are You?  In modern digital enterprises, the fastest-growing identity population is no longer human users; it is machine identity.  APIs, microservices, containers, cloud workloads, CI/CD pipelines, robotic process…

Read more…

Mobile Networks Weaponized in Drone Warfare

31095488256?profile=RESIZE_400x Telecom security specialist ENEA has published a report highlighting how public 4G and 5G networks are increasingly integrated into modern drone operations during armed conflicts, particularly the Russia-Ukraine war.  The analysis raises concerns about the vulnerability of civilian infrastructure and urges…

Read more…
Views: 7
Comments: 0

31095023671?profile=RESIZE_400x Military action in Iran has increased the potential of cyberattacks from Iranian-sponsored actors and hacktivists, and criminal groups aligned with Iran.  Below is a brief on the types of attacks Iran has executed or sponsored in the past to provide a starting roadmap based on their past cyberattacks during similar times of conflict.[1]   

While the line…

Read more…

31095040692?profile=RESIZE_400x A new report from blockchain data platform Chainalysis has revealed a significant rise in the use of cryptocurrency for illicit activities related to human trafficking.  The research indicates that cryptocurrency payments to suspected human trafficking services increased by 85% year-on-year in 2025, with the total value reaching hundreds of millions of dollars across the identified…

Read more…

Dungeons, Dragons & AI

31095039253?profile=RESIZE_400x Most people think of Dungeons and Dragons (D&D) as a place for imagination, dice, and heroic misadventures.  Yet a team of computer scientists has turned this iconic tabletop game into something far more ambitious: a laboratory for understanding how artificial intelligence behaves when it must operate independently for long periods.  Their research paper, Setting the DC:…

Read more…

The Hub – South Africa

31094092853?profile=RESIZE_400x Phishing remains the highest risk category for users and organizations in South Africa, accounting for 45.7% of detected threats.  According to ESET Research’s latest Threat Report, this compares with a significantly lower 32.5% in Africa.  The report summarizes the threat landscape trends observed in ESET telemetry and analyzed by ESET threat detection and research experts in the…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT