Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

WiFi Warning

31105755680?profile=RESIZE_400x In an increasingly interconnected, digital world, it's essential to make the right choices for your security on the Internet. There are good habits to get into to improve online safety, and you should keep your ear to the ground to know when a new threat has emerged or become more prevalent. For example, the Federal Bureau of Investigation recently warned that something as seemingly…

Read more…

31105892100?profile=RESIZE_400x The Federal Bureau of Investigation (FBI) has officially confirmed that a limited number of its servers have been compromised in a cybersecurity incident.  The breach affected surveillance systems used by the FBI for lawful foreign intelligence interception operations, with investigators suspecting state-backed Chinese hackers based on suspicious activity patterns.  The security breach…

Read more…

Cybercrime Goes Professional

31105686078?profile=RESIZE_400x Hewlett Packard Enterprise (HPE) has released its inaugural cyber threat report, titled 'In the Wild', revealing a significant shift in the operational strategies of modern cyber adversaries.  Released on 17 March 2026, the research indicates that cybercrime groups are increasingly mirroring legitimate enterprise business models to maximize financial gain.  The report, based on an…

Read more…

What Could Go Wrong?

31105569279?profile=RESIZE_400x You probably associate information security with desktops and laptops, business computers, and servers in datacenters.  Too often, we assume that our mobile devices are inherently more secure, probably because of how we interact with them.  But last week’s security news includes warnings for iPhone and Android users.  Just a reminder that no one is safe.

First, if you…

Read more…

Android’s TaxiSpy RAT Targets Banking Sector

31105252057?profile=RESIZE_400x Cyfirma cybersecurity researchers have unveiled a detailed analysis of a new threat: TaxiSpy RAT, a sophisticated Android banking trojan with remote access capabilities.  This malware primarily targets Russian users and financial institutions, compromising apps related to banking, cryptocurrency, government services, and online marketplaces.  The report highlights how this threat…

Read more…

Russian Hackers Target Signal & WhatsApp

31105250696?profile=RESIZE_400x Dutch intelligence agencies have revealed an extensive cyber campaign by Russian state-backed hackers aimed at infiltrating Signal and WhatsApp accounts of high-profile individuals worldwide.   The Military Intelligence and Security Service (MIVD) and General Intelligence and Security Service (AIVD) describe the effort as large-scale and ongoing, exploiting user vulnerabilities rather…

Read more…

31105056077?profile=RESIZE_400x Every time you check your bank balance online, send an email, or make a purchase with a credit card, your information is encrypted, a mathematical shield that keeps your data protected from prying eyes.  This encryption has worked extremely well for decades.  The algorithms safeguarding your most sensitive data would take today’s most powerful traditional computers millions of years to…

Read more…

31105065901?profile=RESIZE_400x In the ongoing conflict between the United States and Iran, cyber operations have emerged as a significant component alongside conventional military actions.  Operation Epic Fury, initiated on 28 February 2026, involved coordinated strikes that targeted key Iranian leadership and infrastructure, with digital disruptions playing a crucial role in limiting the adversary's response…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT