Will Quantum Computers Break RSA in 2023? Modern cryptography, including advanced techniques such as elliptic curve cryptography and homomorphic encryption, has revolutionized how digital data is secured and transmitted. Ciphers, an integral part of
All Articles (37)
A recent report from the internet security company Cloudflare details an increase in what is known as hyper-volumetric DDoS attacks since the beginning of this year. One of these attacks was a hyper-volumetric attack boasting more than 71 million HTT
HEALTHCARE CYBER SECURITY- THE HEALTHCARE SECTOR was once a hands-off industry for criminal and state-sponsored hackers. This has drastically changed in recent times. From simple DDoS threats to ransomware attacks, which have sometimes resulted in pa
BATLOADER IS NOT FROM GOTHAM CITY--The malware downloader known as BATLOADER has been observed abusing Google Ads to deliver secondary payloads like Vidar Stealer and Ursnif. Cybersecurity researchers say malicious ads spoof a wide range of legitimat
'NEXUS’ A NEW RISING ANDROID TROJAN, TARGETS 450 FINANCIAL APPLICATIONS. The Nexus trojan appears specifically designed to conduct account takeover attacks: it can overlay on top of target applications, can log the victim’s key presses, can steal two
A ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate victims worldwide with million-dollar ransom demands. Like most enterprise-targeting ransomware operations, Medusa has a data leak site named 'Medusa Blog.
Tim Benitez is the Resident Agent in Charge – of the USSS. In addition to protecting POTUS and VPOTUS, and other national dignitaries, Tim is a cyber security expert. Today he will share his top 3 cyber issues he is seeing in his vital work.
MARCH 8TH REDSHORT — Continuing from our report in September, in this week's REDSHORT we'll be discussing another recent LastPass breach that occurred in December. This incident has connections to both the previous incident in August and a recent rep
US Banks are backing away from crypto companies, concerned by a regulatory crackdown that threatens to sever digital currencies from the real-world financial system. Join us to find out more.
“Beep” malware heavily focuses on evasion, having implemented multiple anti-analysis mechanisms before finalizing the full feature set for data theft and the execution of commands. Although its operations in the wild remain limited for the time being
February 15th REDSHORT — Hackers use QuickNote (aka QakBot) to deliver phishing attacks. Threat actors have started experimenting with a new distribution method since the end of January. The malware payloads include AsyncRAT, Redline, AgentTesla, and
On January 26th, 2023, a version of the U.S. No-Fly list from 2019 was shared on a popular hacking forum. This information was obtained by Swiss hacker “maia arson crimew” from a misconfigured AWS server. In this week’s REDSHORT we’ll examine the nat
February 1st REDSHORT — Social Engineering is the term used for a broad range of malicious activities accomplished through human interactions. Social engineering is especially dangerous because it relies on human error rather than software and operat
January 25TH REDSHORT — Scattered Spider’s Devious Web Custom Malware. Deploys a malicious kernel driver through a vulnerability (CVE-2015-2291) in the Intel Ethernet diagnostics driver. The activity exploits a well-known and pervasive deficiency in
January 18TH REDSHORT — APT Group Dark Pink Doubles Down on Government & Military Targets with Custom Malware. Considered an advanced persistent threat (APT), Dark Pink has launched at least seven successful attacks between June and December 2022. Du
January 11TH REDSHORT — Twenty car manufacturers contain API cyber security vulnerabilities. Hackers can track cars in real time, introducing potential physical risks and impacting the privacy of millions of car owners. These vulnerabilities could ha
January 4TH REDSHORT — The pay-per-install distribution method for malware is taking focus, yet again, with the discovery of a new information-stealing malware known as RisePro. This malware is designed to steal information from victims’ machines, li
WEEKLY WEBINAR REDSHORT REGISTRATION
Register for our LIVE REDSHORT. webinars and never miss our weekly broadcast. RED' as in something important from Red Sky Alliance and 'SHORT' as in 10 minutes or less. We will cover highlights of trending topics.
Comments
You need to be a member of Red Sky Alliance to add comments!
Comments are closed.
Comments