Home

Red Sky® Alliance has been serving information security professionals for over eleven years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

ANNOUNCEMENT - WAPACKLABS.COM IS NOW REDSKYALLIANCE.COM
A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company delivers insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

HSIN Annual Report 2022

11003994293?profile=RESIZE_400x The Homeland Security Information Network (HSIN) is the Department of Homeland Security’s official system for trusted sharing of Sensitive But Unclassified (SBU) information between federal, state, local, tribal, territorial, international, and private sector partners.  HSIN users rely on the platform to access mission-critical data, send requests securely between agencies, manage…

Read more…

Another Brick in the AI Wall

Big-data analytics firm Databricks Inc. has emerged as an unlikely player in the generative artificial intelligence space. Databricks is open-sourcing a new AI model that it claims is “as magical as ChatGPT,” despite being trained on far less data in less than three hours using a single machine.

Databricks announced in a blog post today that it’s making what it calls ‘Dolly’ available for anyone to use, for any purpose, as an open-source model, together with all its training code and…

Read more…

Synactive Wins, Tesla Loses

11003976854?profile=RESIZE_400x Tesla has been hacked at the Pwn2Own hacking event, and the hacking group has
taken home a Tesla Model 3 and $100,000.

As electric vehicles and their significant amount of integrated software have become more common in everyday life, the security around them has become significantly more critical.  In the worst-case scenario, a hacker could not only gain access to a car…

Read more…

Cybercrime Website is Off the Air

11003652893?profile=RESIZE_400x A New York man accused of running the popular cybercrime forum BreachForums was recently arrested and charged.  He is believed to be Pompompurin, an individual whose online moniker was mentioned in several high-profile hacking stories in the past years.   It is sad to know that this criminal used the name Pompompurin, which is the name of a good natured Golden Retriever dog character…

Read more…

iEarn Bot is a Scam

11004874671?profile=RESIZE_400x According to various investigating agencies, thousands are believed to have lost their savings after investing in a cryptocurrency trading app called iEarn Bot   https://www.iearnbot.com.  DO NOT VISIT THIS WEBSITE; IT IS A SCAM.  Experts investigating the company say it could be one of the largest crypto scandals.  Cryptocurrency trading has become popular, with people often…

Read more…

BATLOADER is Not From Gotham City

11004871290?profile=RESIZE_400x The malware downloader BATLOADER has been observed abusing Google ADs to deliver secondary payloads like Vidar Stealer and Ursnif.  According to cybersecurity researchers, malicious ads are used to spoof a wide range of legitimate apps and services, such as Adobe, OpenAPI's ChatGPT, Spotify, Tableau, and Zoom.  BATLOADER, as the name suggests, is a loader responsible for distributing…

Read more…

Visher on Line 1

11002441075?profile=RESIZE_400x Phishing, the theft of users' credentials or sensitive data using social engineering, has been a significant threat since the early days of the internet and continues to plague organizations, accounting for more than 30% of all known breaches. With the ongoing trend to remote working during and post pandemic, hackers have increased their efforts to steal login credentials as they take…

Read more…

IAM Guidelines

11004182894?profile=RESIZE_400x As part of the Enduring Security Framework (ESF), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released Identity and Access Management Recommended Best Practices Guide for Administrators.  These best practices provide system administrators with actionable recommendations to better secure their systems from Identity and Access…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as in something important from Red Sky Alliance and 'SHORT' as in 10 minutes or less twice a month. We will cover highlights of trending topics, Trending Cyber Indicators, and include a link to a detailed report we will share. 

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT