Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

Your Identity May Be Weaker Than You Think

31094088257?profile=RESIZE_400x Recently, a report was released from Unit 42, a threat intelligence and incident response arm of Palo Alto Networks detailing an investigation of approximately 750 breaches between 2024 and 2025.

Their findings indicate that "identity weaknesses" were present in about 89% of investigated cases. Additionally, in 65% of these cases, it seems that attackers were able to gain initial…

Read more…

Who is Driving a Waymo Robotaxi?

31092991877?profile=RESIZE_400x The future of autonomous vehicles took a surprising turn on 04 February 2026, when Waymo's Chief Safety Officer, Dr. Mauricio Peña, publicly confirmed that Waymo's driverless taxis sometimes rely on remote human operators, including workers based in the Philippines, to assist vehicles when the onboard autonomous system encounters challenges.  This revelation, disclosed during a US…

Read more…

31093911489?profile=RESIZE_180x180 Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms.  But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand’s real website, and then acts as a relay…

Read more…

Incognito Fingerprinting

31093822883?profile=RESIZE_400x Browser Fingerprinting - In an article by Rahul Naskar, he describes vulnerabilities with Incognito.  “I'm not a privacy enthusiast, but that doesn't mean I don't care about it.  I have always used the best settings to protect my privacy since I learned about the benefits of controlling how my personal information is collected, stored, and shared online.  I still…

Read more…

Feds Signal Shift in Vulnerability Oversight

31092988699?profile=RESIZE_400x The US federal government is rethinking how to support its globally adopted vulnerability tracking ecosystem after years of backlogs, funding scares, and growing doubts about whether the existing model can scale as vulnerability disclosures continue to accelerate.  At the center of that ecosystem, there are two distinct but interdependent components.  The Common Vulnerabilities and…

Read more…

Winos 4.0 – ValleyRat & Silver Fox

31093454654?profile=RESIZE_192X FortiGuard Labs recently observed several targeted phishing campaigns in Taiwan that use themes designed to exploit local business processes.  These campaigns disseminate Winos 4.0 (ValleyRat) and subsequent malicious plugins through weaponized attachments or embedded links.  The lures mimic official communications, such as tax audit notifications, tax filing software installers, and…

Read more…

Hidden Costs of Supply Chain Attacks

31092986694?profile=RESIZE_400x Many malware attacks against open-source software components have compromised thousands of software packages and repositories, but the practical damage these attacks have caused organizations is harder to quantify.  The longer-term and indirect costs of these attacks may prove most significant for organizations.  Open-source components and software have long been a well-established…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT