Home

Red Sky® Alliance has been serving information security professionals for over eleven years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

ANNOUNCEMENT - WAPACKLABS.COM IS NOW REDSKYALLIANCE.COM
A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company delivers insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

TOADs

10953410678?profile=RESIZE_400x Last week we presented a topic on our RedShort explaining the expanding social engineering techniques; especially the use of cell phone calls.  The New Jersey NJCCIC recently detected an uptick in TOAD phishing campaigns. TOAD, or telephone-oriented attack delivery, is a type of social engineering attack that lures potential victims to contact fraudulent call centers managed by threat…

Read more…

10953338653?profile=RESIZE_400x In a recent report, Microsoft warns that phishing, fake software updates and unpatched vulnerabilities are being exploited for ransomware attacks.  More than one hundred different cyber-criminal gangs are actively conducting ransomware attacks, deploying over 50 different ransomware families in campaigns which see them encrypt networks and demand a ransom payment for the decryption…

Read more…

Keeping Secrets; Secret

10952779266?profile=RESIZE_400x Do you know where your secrets are?  Hopefully they remain with YOU.  If you tell just one other person your secret, then it is not a secret anymore.  Next question, where are your cyber secrets?   Don’t know?  Well, hundreds of CISOs, CSOs, and security leaders, whether from small or large companies, do not know where their cyber secrets are either.  It does not matter the…

Read more…

Pen Testing - How Often?

Any organization that handles sensitive data must be diligent in its security efforts, which include regular pen testing. Even a small data breach can result in significant damage to an organization's reputation and bottom line.

There are two main reasons why regular pen testing is necessary for secure web application development – Security: Web applications are constantly evolving, and new vulnerabilities are being discovered all the time. Pen testing helps identify…

Read more…

Code-Signing Certificate Theft

10952854294?profile=RESIZE_400x GitHub states that hackers gained access to its code repositories and stole code-signing certificates for two of its desktop apps: Desktop and Atom.  Although attackers exfiltrated a set of encrypted code-signing certificates, these were password-protected, so there is no possibility of malicious use.

GitHub revealed that on 7 December 2022, hackers gained unauthorized access to…

Read more…

Nothing is Buzzing at the Hive

10952147671?profile=RESIZE_180x180 The long arm of the law has grabbed the Hive ransomware operation, and it appears to have been shut down as part of a major law enforcement operation involving agencies in 10 countries.  A message in English and Russian on the Hive ransomware operation’s Tor-based website reads: “The Federal Bureau of Investigation seized this site as part of a coordinated law enforcement action…

Read more…

10952079470?profile=RESIZE_400x The US Securities and Exchange Commission (SEC) in 2023 requires corporate boards to improve their cybersecurity act and increase transparency by disclosing cybersecurity incidents with full details to the SEC and investors within four (4) business days.

In addition to reporting there was an incident, publicly traded corporations must identify who on their board or which…

Read more…

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as in something important from Red Sky Alliance and 'SHORT' as in 10 minutes or less twice a month. We will cover highlights of trending topics, Trending Cyber Indicators, and include a link to a detailed report we will share. 

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

In the News

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT