Home

Red Sky® Alliance has been serving information security professionals for over twelve years. We invite businesses and organizations, from enterprises to small businesses, to learn more about cyber threats and how to avoid them. We provide TLP White and Green cyber threat reporting for targeted industry segments, international reports, and malware/bot analyses.

A privately held USA-owned cyber threat intelligence firm that delivers proprietary cyber threat intelligence datasets and services. Our company provides insightful, actionable intelligence in formats best suited to your strategic, operational, and tactical needs.

 

Let us better prepare you and your team for new cyber threats.

Redskyalliance.org offers free access to all, and no salesperson will call.

 

Meet the Magnet Goblin Hacker Group

12401906097?profile=RESIZE_180x180 Magnet Goblin, a financially motivated threat actor, is swiftly adopting one-day security vulnerabilities into its arsenal to opportunistically breach edge devices and public-facing services and deploy malware on compromised hosts.  Threat actor group Magnet Goblin's hallmark is its ability to swiftly leverage newly disclosed vulnerabilities, mainly targeting public-facing servers and…

Read more…

Cyber Criminals using BEC

12399992484?profile=RESIZE_400x Organizations in the US have been targeted since at least 2021 in various phishing and business email compromise (BEC) campaigns spoofing government and private businesses.  The attacks, attributed to a threat actor tracked as TA4903, were focused on harvesting corporate credentials to enable BEC activities such as invoice fraud or payroll redirect.  As part of the observed attacks,…

Read more…

Belfast Cyber Achievements

12400605077?profile=RESIZE_400x Ireland’s businesses have been warned of the need to have cyber security safeguards during a recent cyber security conference staged in Belfast.  The Check Point Cyber Security Summit took place at Titanic Belfast, with bosses from Microsoft and NI’s GitHub leading the conversation on how to combat hackers and cyber threats.

Billed as a summit unlike any other in the cyber…

Read more…

12400254075?profile=RESIZE_400x Cyber security is undergoing a massive transformation, with Artificial intelligence (AI) at the forefront of this change, posing both a threat and an opportunity.  AI can potentially empower organizations to defeat cyberattacks at machine speed and drive innovation and efficiency in threat detection, hunting, and incident response.  Adversaries can use AI as part of their exploits.  It…

Read more…

Healthcare Attacks on the Rise

12400551497?profile=RESIZE_400x There seems to be a very disturbing cyber-attack trend that is targeting our Healthcare sector.  This should be of a huge concern for everyone.  There used to be certain sectors that state sponsoredaccount access and criminal hackers would shy away.  Those days are gone.  The healthcare industry is an increasingly appealing target for cybercriminals from around the world.  The reason…

Read more…

US Election Integrity

12399706096?profile=RESIZE_400x The top US intelligence agency has revamped its election security team ahead of the 2024 presidential election, a contest multiple national security leaders have warned could be targeted by foreign adversaries using fast-moving attacks.  Jessica Brandt, who previously held a variety of prominent research roles at Washington think tanks, was appointed the first full-fledged director of…

Read more…

Spinning Yarn Malware

12400205061?profile=RESIZE_400x Linux Users Beware -- The Spinning YARN malware campaign targets misconfigured servers running Apache Hadoop YARN, Docker, Confluence, and Redis web-facing services. Cado Security Labs has discovered an emerging Linux malware campaign dubbed Spinning Yarn. 

The emergence of the new Linux malware shouldn’t surprise, given the recent surge in threats targeting Linux devices and…

Read more…

Microsoft’s Ongoing Cyber Attack

12400169052?profile=RESIZE_400x A Microsoft spokesman reported that the Russian government-backed hacking team that broke into its corporate network and spied on senior executives also stole source code and may still be poking around its internal computer systems.  In what is being described as an “ongoing attack,” the world’s largest software maker says it has evidence the hacking group “is using information…

Read more…

In the News

2023 REDSHORTS

REDSHORT Webinars

Please Join our REDSHORT webinars. 'RED' as something important from Red Sky Alliance, and 'SHORT' in 10 minutes or less twice a month. We will cover highlights of trending topics.

REGISTER HERE

Cyber Security Blog

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Comments

This reply was deleted.

Red Sky Alliance

For more information about Red Sky Alliance, follow the link, ABOUT