Home

Red Sky® Alliance

Wapack Labs has been serving information security professionals for over eight years. We invite businesses and organizations, enterprise to small businesses to learn more about cyber threats and how to avoid them. We provide reports, indicators, references and training about targeted, advanced, and emerging cyber threats in our private portal.

Red Sky® Alliance offers TLP White and Green cyber threat reporting for targeted industry segments, international reports and malware/bot analyses.

Let us better prepare you and your team for new cyber threats.

Signing up for access to all content is simple, just enter your name and email address. Redskyalliance.org is free to members and no salesperson will call.

‘Tis the Season for Holiday Shopping Scams

9869173894?profile=RESIZE_400x It is the most wonderful time of the year… unless you get scammed. The holiday shopping season is in full swing, and so are fraudsters looking to steal your money and more.  With more people shopping online, digital retailers make getting your holiday shopping done easy; you can buy what you need without going outside.  It also comes with its own unique risks. Digital payment fraud has…

Read more…

Cyber Security Risks in Mergers & Acquisitions

9868929669?profile=RESIZE_400x In today’s business world, mergers and acquisitions are commonplace as businesses combine, acquire, and enter various partnerships.  Mergers and Acquisitions (M&A) are filled with often very complicated and complex processes to merge business processes, management, and a whole slew of other aspects of combining two businesses into a single logical entity.  There have been…

Read more…

9868898064?profile=RESIZE_400x State-sponsored hacking groups, also known as advanced persistent threats (ATPs), have adopted this year a new attack technique called “RTF Template Injection,” which has brought a new twist and made their attacks harder to detect and stop.   Proofpoint is reporting that APTs from China, Russia, and India are already exploiting this technique, which they also expect to see adopted by…

Read more…

9868168285?profile=RESIZE_400x There seems to be a pattern in data breach and other cyber-attack cases.  After a data breach, a company often turns to its insurer for coverage.  Some companies have specialized cyber insurance and sometimes it does not.  Yet, even if businesses have paid for what they believe to be comprehensive cyber security risk insurance, the insurer may refuse to pay the claim.  Insurers often…

Read more…

A Wolf in Business Casual Clothing

9864834675?profile=RESIZE_400x Nobody wants to believe they’ll fall for a scam.  Especially not any of you, my intelligent, savvy, and OPSEC-conscious friends!  Your radar is always on and carefully protecting your personal information, so you’d never click the link in that fortune-promising email, you’d never open an unexpected file attachment, and you’d certainly never send some stranger a document with your…

Read more…

Phishing on Discord

9861149277?profile=RESIZE_400x An advanced malware operation on Discord utilizes the Babadeda crypter to hide malware that targets the crypto, NFT, and DeFi communities.  Babadeda is a crypter used to encrypt and obfuscate malicious payloads in what appear to be harmless application installers or programs.  Starting in May 2021, threat actors have been distributing remote access trojans obfuscated by Babadeda as a…

Read more…

Hackers are using AI to Beat Cyber Defenders

9857998096?profile=RESIZE_400x Are hackers better at using AI than defenders?  “There are three parts of any security strategy. You want to be able to detect, to prevent, and to respond,” says the Global Chief Technology Officer of Dell Technologies.  “It turns out that in the 'detect' area, we are well underway.  If you are using a security event information-management service or managed-security service provider,…

Read more…

Long Passwords are Better

9840518456?profile=RESIZE_400x Microsoft (MS) announced recently that data collected by its network of honeypot servers, that most brute-force attackers primarily attempt to guess short passwords, with very few attacks targeting credentials that are either long or contain complex characters.

“I analyzed the credentials entered from over >25 million brute force attacks against SSH.  This is around 30 days of…

Read more…

In the News

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Join Red Sky Alliance

Comments

  • In another attempt to disrupt the maritime supply chain, Bureau Veritas (BV) was hit with a cyber-attack. BV handles vessel/ship classification.
  • From our Friends at the NH Information and Analysis Center: The below tips are just a few reminders of how to be cyber-safe during the holiday season.
    • Use caution with e-mails. Avoid clicking on links in unsolicited or suspicious emails and be wary of email attachments. It is always best to go to the site by searching the known and trusted URL and not using the one provided to you. It is also important to verify the sender by contacting them through a known and trusted contact method.
    • Be mindful of scam calls and text messages. It is important to only shop through trusted sources and do not give out personal information over the phone unless it is a trusted source.
    • If it sounds too good to be true, it likely is. Whether the cyber actor is redirecting you to a fake fraudulent site that appears to be legitimate or is posting a malvertisement (malicious advertisement) with the goal of spreading malware to your system. It is important to verify all ADs by going directly to the known, trusted site.
    • Don’t share your information. Most retailers do not need to know our date of birth or social security number for you to simply purchase a gift or gift card. If a retailer is asking for this information, be wary and consider shopping elsewhere.
    • Check your online statements frequently. This will help prevent and catch any criminals in the act of using your credit or debit cards.
  • Check out the up-dated Indicators section.
  • Robinhood Financial hit again.
  • Employ Zero Trust in your networks and workforce.
  • Ukrainian authorities have detain a criminal gang who laundered funds for Russian hacking groups. https://www.npu.gov.ua/news/kiberzlochini/ukrajinski-pravooxoronczi...
    Українські правоохоронці блокували діяльність членів міжнародного транснаціонального хакерського уг…
    За інформацією американських колег, члени угруповання легалізовували  грошові кошти з мережі Darknet в особливо великих розмірах. Відтак у рамках між…
  • DeepBlueMagic ransomware hits Israeli Hospitals.
  • US AI at kindergarten level. Huh? Check out the recent resignation of a US Pentagon official.
  • Facebook Woes - the social media giant is currently under the gun.
  • Readers, please click on the Peterborough, NH news story above. Jonathon Sweeney of Red Sky Alliance was interviewed for the story.
This reply was deleted.
E-mail me when people leave their comments –

2021 SMART4SEA Talk - Becoming cyber resilient: Past, Present,Future

Botnet Detection With Red Sky Alliance & IPinfo

Identify possible malware installations using either our botnet tracker collection or our sinkhole traffic collection. In many cases, it can also identify the malware protocol resulting in high confidence hits. This threat intelligence includes source IP addresses, destination IP addresses, domains, or URLs. DEMO SIGNUP

Webinars

Please Join our REDSHORT webinar. 'RED' as in something important from Red Sky Alliance and 'SHORT' as in 10 minutes or less twice a month. We will cover highlights of 1-2 trending topics, Trending Cyber Indicators, and include a link to a detailed report we will share. Our Encore presentations, also twice a month, same place & time, we will present previous webinars. Questions on any of these webinars can be answered in our redskyalliance.org Cyber Security Blog.

REGISTER HERE