Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

31078679466?profile=RESIZE_400x

According to a recent report by Check Point Software, the number of publicly disclosed ransomware incidents increased approximately 60% year over year as of December.  In fact, there were nearly 1,000 reported incidents in December alone. This marks a clear increase in the consistency and scale of ransomware growth.

A potential contributor to this increase is the fact that…

Read more…

Chinese Hack US Congress’ Emails

31078641094?profile=RESIZE_400x In a significant cyber intrusion, Chinese hackers linked to the Salt Typhoon group have accessed email systems used by staff in key US House of Representatives committees. The breach, reported by the Financial Times and covered by Reuters, affects aides on the House Select Committee on China, as well as those handling foreign affairs, intelligence, and armed services.  Detected in…

Read more…

31074714699?profile=RESIZE_400x It looks like Google is opening its wallet again.  The tech giant has agreed to pay $8.25 million to settle a class-action lawsuit that claimed it was secretly collecting data from children.  This case focused on how the tech giant handled the personal details of kids under the age of 13 who used apps from the Google Play Store.

Why the Lawsuit Was Filed - The legal trouble…

Read more…

Cyber Operations & Military Actions

31076195881?profile=RESIZE_400x Cyber operations are increasingly viewed as a preparatory measure to influence the battlespace before conventional air or ground forces engage.  Critical infrastructure such as power grids, communication networks, and information systems has become a strategic target.  Disrupting these can impede decision-making, degrade defensive capabilities, and create openings for traditional…

Read more…

Are 'Passkeys' Better than Passwords?

 

31075096301?profile=RESIZE_400x Has your phone been prompting you for months to log into certain sites with a "passkey"?  Security writer Kim Key of PC Mag explains why you might want to ditch your passwords in favor of passkeys.

JUANA SUMMERS, HOST: For months now, my phone has been nudging me to create passkeys.  And every time it happens, I sort of pause because I don't actually know what a passkey…

Read more…

UDPGangster Backdoor

31065533865?profile=RESIZE_400x UDPGangster is a UDP-based backdoor associated with the MuddyWater threat group, which is known for its cyber espionage operations across the Middle East and neighboring regions.  This malware enables remote control of compromised systems by allowing attackers to execute commands, exfiltrate files, and deploy additional payloads, all communicated through UDP channels designed to evade…

Read more…

Amnesia RAT Multi-Stage Attack

31065544065?profile=RESIZE_400x FortiGuard Labs recently identified a multi-stage malware campaign primarily targeting users in Russia.  The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign.  These documents and accompanying scripts serve as visual distractions, diverting victims to fake tasks or status messages while malicious activity runs…

Read more…

Submarine Cyber Attacks

31065083858?profile=RESIZE_400x military

In July 2025, Russian President Vladimir Putin proudly added a new nuclear submarine, the Knyaz Pozharsky, to the country’s fleet. He celebrated it as proof that Russia could still build powerful weapons despite Western sanctions. But the celebration didn’t last long. Only days later, Ukrainian cyber experts managed to hack into Russian military networks. They stole and…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less weekly. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT