Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

TechnoPhobia

31045252299?profile=RESIZE_400x Every great human leap forward has been born of fire—literal or metaphorical.  We tamed fire and warmed our caves.  We forged steel and raised skyscrapers. We cracked the atom and unleashed terrible power.  But with each advance, we danced closer to forces that could consume us.  And now, in the glow of computer screens and in the silicon minds we’ve begun to shape, some see another…

Read more…

31043733266?profile=RESIZE_400x Ransomware is no longer a niche threat.  It shows up across industries, company sizes, and geographies but some groups remain far more exposed than others.  Ransomware appeared in 44% of breaches analyzed in Verizon’s 2025 DBIR executive summary, up from 32% the previous year.  This sharp…

Read more…

2026 Going Forward

31040441252?profile=RESIZE_400x As the digital landscape evolves, 2026 is shaping up to be a turning point for cybersecurity. AI, quantum computing and increasingly sophisticated threat actors are reshaping how both businesses and individuals think about digital risks.  Based on Vytautas Kaziukonis, a Forbes Councils Member and his experience as a founder and CEO in the cybersecurity space, he shares his views into…

Read more…

NFC Malware

31043722452?profile=RESIZE_400x Cybersecurity researchers at ESET have uncovered a troubling new trend in cybercrime: hackers are now using AI-generated malware to intercept payments made through Near Field Communication (NFC)-enabled devices.  This advanced malware is capable of relaying sensitive payment card data, carrying out fraudulent online purchases, and even enabling unauthorized withdrawals from Automated…

Read more…

Apple and the MacSync Stealer

31040565899?profile=RESIZE_400x For years, Mac users have felt a sense of security thanks to Apple’s strict notarization process, a system that ensures an app’s safety. However, a new report from Apple device security experts at Jamf Threat Labs shows that hackers are finding ways to get that official seal of approval for their own malicious tools.

Researchers were able to identify this trick while tracking a…

Read more…

Chinese Threat Group Turns on Russia

31045221678?profile=RESIZE_400x The advanced persistent threat (APT) group known as APT31, which Western governments have linked to China's state-sponsored espionage efforts, has been attributed to a series of cyberattacks targeting Russia's information technology (IT) sector. These attacks primarily focused on companies serving as contractors and integrators for government agencies, with activity spanning from late…

Read more…

AI Platforms Deliver Malware for Free

31045220469?profile=RESIZE_400x Cybercriminals are exploiting the implicit trust users place in central Artificial Intelligence (AI) platforms to distribute the Atomic macOS Stealer (AMOS).  A new campaign, identified by security researchers at Huntress, reveals that attackers have evolved beyond simply mimicking trusted brands; they are now actively exploiting legitimate services from OpenAI and xAI to host…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT