Many auto dealerships are strongly promoting the safety of customers and employees. This in the wake of the COVID-19 pandemic. That is why the many international dealerships are taking safety protocols seriously. Shields are up in the reception area, employees are wearing face coverings and social distancing, and disposable seat, wheel and shifter covers have been placed in all vehicles. In addition, many are establishing vigorous test drive cleaning protocol and hourly and nightly cleaning
All Articles (2444)
There will be no let-up in ransomware attacks, as it has proven to such a profitable business model of cybercriminals. The cybersecurity landscape is evolving, and many businesses do not understand how to keep their defenses ahead of the attackers. While major corporations can spend as much as $1 billion a year, many small companies may not have the budget to hire a cybersecurity vendor to help them keep up with all the technology available needed to deter hackers. The loss of just a few thou
All organizations should consider working with a cyber threat intelligence firm to send test “Phishing” emails to random employees on a regular basis. This will test employee vulnerabilities to provide subsequent remediation plans. Training and instruction from cyber professionals are always cheaper than absorbing the costs of remediation, paying ransoms or having confidential data exposed or auctioned to the highest bidder.
Researchers at two security firms are tracking separate phishing camp
Activity Summary - Week Ending 26 June 2020:
- Analysts identified 3,945 new IP addresses participating in various Botnets
- Red Sky Alliance identified 55,969 connections from new unique IP addresses
- Pegasus malware is Back on the Scene
- Octopus Scanner keeps Spreads on GitHub
- SNAKE Ransomware
- LODEINFO malware visits Japan
- Oil Prices keep inching Upward
- North Sea Oil Shutdowns and Arctic Openings
- Malaysian energy giant Petronas
- Australia blaming China in past and recent Cyber Attacks
Link to full
There is a Russian saying that rings true in protecting entities against cyber threats, “I am not concerned about all of the wolves in Siberia, I am only concerned about the wolves that are now chasing my sleigh.” The world is full of cyber threats, hackers and state sponsored cyber terrorists who are targeting governments, businesses, and organizations. The way Red Sky Alliance can help the maritime industry and its supply chain is to focus on the cyber threats directly targeting a specific o
2020, a year that will be remembered for many reasons. Stories will be told to children and grandchildren of when we all had to wear face masks, stand 6 feet apart, there were no sports, and where people were not permitted to hug or shake hands. Then there was the next economic collapse and subsequent worldwide insurrection. For those who hunt cybercriminals and attempt to expose criminal and state-sponsored hacking operations and techniques, the blurring of the lines between what constitutes
Activity Summary - Week Ending 19 June 2020:
- Red Sky Alliance identified 69,939 connections from new unique IP addresses
- Analysts identified 4,135 new IP addresses participating in various Botnets
- Wabot leads the ‘Hits’ for Malware
- Advertising Droppers and the Google Store
- Higaisa APT
- T-Mobile gets hit with a DDoS attack, that is…according to Anonymous
- Oil Prices slow a Bit and the Corona Pandemic is still Active
- ReconAfrica and Botswana
- BP Shares falling
- Pakistan investigating Black Marketing
One unhappy employee can ruin your day, your reputation, and cost millions of dollars in losses. Government agencies, companies and organizations of any size are all at risk. Employees planning to leave their jobs are involved in 60% of insider cybersecurity incidents and data leaks, new research suggests. According to the Securonix 2020 Insider Threat Report, published in May 2020, "flight risk" employees, generally deemed to be individuals on the verge of resigning or otherwise leaving a jo
Maze Ransomware hackers, previously known in the hacker community as “ChaCha Ransomware,” was discovered on 29 May 2020 by Jerome Segura, a malware intelligence officer. The main goal of ransomware is to encrypt all files in an infected system and subsequently demand a ransom to recover the files. The threat actor who took credit for compromising an insurance giant , seems to continue its attacking spree with full intensity. It is currently targeting the aerospace sector, specifically mainten
Like any profitable business model, ransomware gangs continue to innovate and increase their business. Recently, reports have emerged of a collaboration between the Maze and Lockbit gangs, as well as the REvil, aka Sodinokibi, operators not leaking stolen data for free when victims do not pay, but instead auctioning it off to the highest bidder.
Here are some of the latest ransomware trends noted by cyber analysts: IR-20-164-002_Ransomware Trends.pdf
Activity Summary - Week Ending 12 June 2020:
- Red Sky Alliance identified 53,951 Connections from new unique IP Addresses
- Analysts observed 25 unique email accounts compromised with Keyloggers
- 3,997 new IP addresses were observed participating in various Botnets
- Bradford British Telecommunications - Compromised (C2) IP: 147.147.220.86
- Octopus Scanner Spreads on GitHub
- Telnetd.IAC.Buffer.Overflow
- Industrial Enterprises are being Targeted
- Saudi Arabia leading OPEC in oil production cuts, or Maybe
Cyber-criminal and using the Corona Virus pandemic to spread the TrickBot malware. These underhanded hackers are sending fake emails designed to look like notifications from the US Department of Labor concerning changes to the Family and Medical Leave Act (FMLA), which can provide up to 12 weeks of unpaid leave for employees who are ill or need to care for someone with a serious medical condition. Benefits from FMLA increased in March 2020 when US President Trump signed the Families First Coro
As cyberattacks rise, so does the call by business leaders and shareholders to be ready to respond to a cyber incident. Cyber insurance and a solid Incident Response plan are two critical components to make your company resilient.
Cyber attorney Shawn Tuma says one of these things is likely to influence the other, which surprises many organizations and may surprise you. Tuma is Co-Chair of the Data Privacy and Cybersecurity Practice at law firm Spencer Fane, www.spencerfane.com.
Tuma explains
Activity Summary - Week Ending 5 June 2020:
- Red Sky Alliance observed 15 unique email accounts compromised with Keyloggers
- Analysts identified 4,332 new IP addresses participating in various Botnets
- Red Sky Alliance collections identified 62,899 connections from new unique IP addresses
- Zload Variant at it Again
- SaltStack
- Octopus Scanner and the vulnerable Supply Chain
- Anonymous – “They’re Back”
- Floating Storage has soared to a New High
- OPEC Oil Output hits the lowest levels in 20 Years
- Rosneft
By Mac McKee – Red Sky Alliance (photo by protonmail)
There is a common misconception among small and midsize businesses (SMBs) that hackers target only large organizations. Unfortunately, this belief is completely inaccurate. According to the most recent Verizon Data Breach Investigations Report, more than 70 percent of cyberattacks target small businesses. Additionally, many attacks are now shifting to target managed service providers (MSPs), specifically because breaching an MSP can give h
Activity Summary - Week Ending 29 May 2020:
- Red Sky Alliance identified 28,772 connections from new unique IP Addresses
- Korean pop singer Kim Hyun-jung being spoofed and it Keylogged
- Analysts identified 6,449 new IP addresses participating in various Botnets
- Anonymous Mexico seen in the Top 5 Threat Actors
- Vendetta Group working in Europe
- Hackers still using the COVID-19 pandemic to spread Malware
- Oil and Gas making a skittish ‘Come Back’
- Russia directly helping the Libyan National Army, Turkey
When my grandfather wanted to make a point, he would make it into a story to hold my attention. Here is a tale for you. Imagine that you recently acquired a nice inheritance from your favorite Aunt Nellie. A great home out in the country is brought to your attention and up for sale, so you decide to buy it. Ah, life is good. As you start getting comfortable in your new house, you decide to bring your priceless art collection, that Aunt Nellie willed to you, to show off your collection of w
Activity Summary - Week Ending 22 May 2020:
- Red Sky Alliance observed 68 unique email accounts compromised with Keyloggers
- Analysts identified 53,148 connections from new unique IP addresses
- MinaOTP and Lazarus
- EVILNUM
- OPEC+ Cuts appear to be Working
- Angola’s Oil Production comes to a Halt
- More Nord Stream 2 legal action in Europe
- Oil Prices continue an Up-hill, See-Saw Climb
- Iran sending Crude Oil to Venezuela, both defying Sanctions
- The Oil Rich South China Sea still in Dispute
- Greta wins a W
Activity Summary - Week Ending 15 May 2020:
- Red Sky Alliance identified 74,978 connections from new unique IP addresses
- Analysts identified 7,927 new IP addresses participating in various Botnets
- Stay away from: ohlordiwantyoutohelpme@gmail.com
- LeetHozer Botnet
- Aggah and new multiple RATs
- Beware of: ThunderSpy
- Olso’s Aker Solutions on a RedXray dashboard - 5876 Breach Data hits for Aker Solutions
- Interactive Brokers didn’t recognize negative Numbers
- Neptune and Egypt OBN
- Qatar Petroleum buying
There is a vigorous debate among geopolitical and military scholars if, and when China will invade Taiwan. At the beginning of the Corona Virus pandemic, many believed that the timing could be ripe for China to militarily invade the island nation of Taiwan. This a long sought-after prize to “reunite China.”
Link to full Report: TR-20-134-001_China Taiwan hotwarFINAL.pdf