All Articles (2242)

Sort by

9442939895?profile=RESIZE_400xNew guidance from the National Institute of Standards and Technology spells out security measures for "critical software" used by federal agencies and minimum standards for testing its source code.  The best practices could be a model for the private sector as well.  NIST's release of best practices carries out a mandate in President Joe Biden's May executive order on cybersecurity, which, in part, called for agencies to address supply chain threats, such as that posed by the SolarWinds incident

9438050454?profile=RESIZE_400xU.S. crime-fighting agencies testified in front of Congress during the last week of July 2021, and the hearing had a chilling title: "America Under Cyber Siege: Preventing and Responding to Ransomware Attacks"

Since January 2021, ransomware attacks have disrupted critical infrastructure, the food supply, IT management, healthcare, education, transportation, and many other sectors of the economy.For the most part, criminal and nation-state actors continue to launch attacks with little fear of fac

9437650658?profile=RESIZE_400xCyber-security researchers at Ben-Gurion University in Israel are very good at looking at situations from a leftfield thinking perspective, recently regarding eavesdropping on your private conversations.  Conventional thinking is to breach your privacy by compromising passwords to access your networks, or the use of vulnerabilities in your software or operating system.   If you thought that ‘physical access’ to your smart speakers, or most any speaker, was required to listen in to the audio bein

9432902473?profile=RESIZE_400xA recent report by Ponemon Institute[1] and commissioned by Team Cymru found that half of the organizations surveyed experienced disruptive cyber-attacks from repeat sophisticated threat actors, the majority of whose exploits were unresolved.  Although organizations acknowledged experiencing disruptive attacks and from repeat offenders, total remediation was not possible.  According to the report, this situation left personal data and organizations’ infrastructure at risk of more attacks.  Last

9428788269?profile=RESIZE_400xSome things seem to come full circle.  Morse Code was invented in the 1800’s by Samuel Morse when he worked with an electrical telegraph system sending pulses of electric current and an electromagnet.  His code used the pulse and breaks between them to transmit information.  Popular with amateur radio operators, this code is no longer required if you want to get a pilots or air traffic controller license, though these individuals often have a basic understanding of the code. Morse code is a meth

9422771294?profile=RESIZE_400xWhat happens when your expert consultant team that has been advising your organization about what you need to do to protect your firm from cyber threats becomes “front page news?” The consultancy Accenture, which offers cybersecurity services, confirmed Wednesday it had been hit by a cyber incident. The ransomware gang LockBit took credit for the attack.  Dublin, Ireland-based Accenture declined to give details on when the incident occurred, its duration or the attack type.

See for more informat

9422660492?profile=RESIZE_400xEvery few months, enterprising cyber criminals are offering new services to enable cybercrimes, thefts and paid ransoms.  These new “services” make crime easier for lower skilled criminals and increase profits for all members of the ransomware supply chain. TM: General Mills

Cyber threat actors who want to take down bigger targets more easily and quickly, ransomware gangs are increasingly tapping initial access brokers, who sell ready access to high-value networks.  On average, such access is so

9421881897?profile=RESIZE_400xActivity Summary - Week Ending 13 August 2021:

  • Red Sky Alliance identified 38,261 connections from new unique IP addresses
  • Analysts observed 39 unique email accounts compromised with Keyloggers
  • Researchers identified 3,451 new IP addresses participating in various Botnets
  • Conti Exposed by m1Geelka
  • RATs – more Remote Access Trojans
  • Bandook Malware
  • Poly Network Hit
  • Ransomware Directly affecting Public Safety
  • China & Israel
  • New AdLoad Malware
  • Perfume and Cyber

Link to full report: IR-21-225-001_w

9415755070?profile=RESIZE_400xCyber threats are not been the only problem for supply chains this past year.  The physical problems of moving large quantities of goods in a reasonable time period are turning into an equally insurmountable problem for all supply chain members.  All consumers will be paying higher prices for nearly every product.  US rail yards, ports, and warehouses are choked with freight, with too few people to move it quickly, causing delays and rising prices for companies and consumers.

California ports in

9415646293?profile=RESIZE_400xRed Sky Alliance has previously reported on John Deer’s cyber woes.  No industry sector is immune from cyber threats, hacking or mischief.  Recently, numerous vulnerabilities were uncovered in tractor manufacturer John Deere's systems that underscore the cyber risks that come with the productivity gains from high-tech farming.  An Australian researcher who goes by the nickname Sick Codes, his LinkedIn profile (11) Sick Codes | LinkedIn  remotely presented his latest findings on 08 August 2021 at

9415248875?profile=RESIZE_400xThe U.S. needs to devise ways to counter Chinese cyber activity including the theft of intellectual property and cyberattacks on government networks and critical infrastructure that poses a direct threat to U.S. national security, according those who testified at a Senate hearing this first week in August 2021.  All organizations need to take immediate steps to stop cyber breaches to protect their data and intellectual Property.  The government cannot curb or stop it, so it is in the hands of al

9408552270?profile=RESIZE_400xOn 5 August 2021 a threat actor using the handle m1Geelka, made a post on the Russian XSS cybercriminal forum.  In the post, they claim to have leaked the manuals and instructions used by the Conti ransomware group whom with they were previously associated.  These posts provide valuable insight into Conti operations.  While the group is highly likely to change its exposed infrastructure and their tactics, techniques, and procedures (TTP’s), network defenders are now able to research this informa

9404982272?profile=RESIZE_400xSupply chain networks have for some time been driven by technology over the years and have evolved accordingly.  The same technologies that make supply chains faster and more effective also threaten their cybersecurity. Supply chains have vulnerabilities along touchpoints with manufacturers, suppliers, and other service providers.

With constant global cyber threats, it is vital that companies involved in the supply chain understand risks and how to respond to them.  So, what is the best way to p

9333480298?profile=RESIZE_400xA data lake is an unstructured repository of data that allows for the storage of different data types from different sources.  Depending on the requirements, a typical organization will require both a data warehouse and a data lake as they serve different needs and use cases.  A data warehouse is a database optimized to analyze relational data coming from transactional systems and lines of business applications.  The data structure and schema are defined in advance to optimize for fast SQL queri

9331924088?profile=RESIZE_400xActivity Summary - Week Ending 30 July 2021:

  • Red Sky Alliance identified 29,998 connections from new unique IP addresses
  • Analysts identified 7,608 new IP addresses participating in various Botnets
  • Do you used Cucurut on YouTube?
  • ‘dmechant’ Malware - Still on the Radar
  • Candiru’s Spyware
  • Google Chrome Security update
  • DNS Cache Poisoning
  • RedLine Malware and the Olympics
  • Israel and Japan working to Protect the Olympics
  • IceFog at the Summer Olympics?
  • BlackMatter group

Link to full report: IR-21-211

9328211474?profile=RESIZE_400xEarlier this month, the infamous hacking group LulzSec’s founder issued a stern warning to the US.  If 2020 was coined The Year of the Digital Pandemic, then 2021 has still not discovered any digital vaccines.  Cyber-attacks have grown rapidly over the past year, and are showing no indications of slowing down.  One ‘former’ Black Hat hacker expressed his growing concern at the lack of preparedness the United States has shown.

The US government has been attacked by several world superpowers durin

9325603291?profile=RESIZE_192XThere appears to be continuing data breach campaign inside the THORChain’s security system. THORChain is a cross-chain DeFi protocol that was hacked last week for the first time and suffered a loss of $8.3 million.  Now it has been hacked again, and this time, attackers allegedly managed to steal $8 million worth of cryptocurrency Ether.

According to THORChain, the decentralized e-commerce exchange has become a victim of a sophisticated attack on its ETH router.  THORChain posted to Twitter to a

9318796279?profile=RESIZE_400xRed Sky Alliance has been monitoring a global phishing campaign which leverages the Ex-Robotos phishing kit to gain access to usernames and passwords of targeted victims. This specific attacker generally targets engineering organizations but has been seen targeting other industries as well. They have been sending out emails since May of 2021, though the tool has been publicly available for purchase since 1 July 20191. Phishing plays a major role in cyber-attacks and often leads to data breaches

9315119659?profile=RESIZE_400xRecently, ransomware criminals claimed as trophies at least three North American insurance brokerages that offer policies to help others survive the very network-paralyzing, data-pilfering extortion attacks they themselves apparently suffered.

Cybercriminals who hack into corporate and government networks to steal sensitive data for extortion routinely try to learn how much cyber insurance coverage the victims have. Knowing what victims can afford to pay can give them an edge in ransom negotiati

9313833695?profile=RESIZE_400xThere’s an old saying in the American West: “Whiskey is for drinking; water is for fighting.”  Back in March, Red Sky Alliance presented facts surrounding the Oldsmar, Florida water treatment cyber-attack.  Well, this critical infrastructure in the US remains a target to cyber-criminals.

The idea that access to water, especially the clean, drinkable kind, is something that is worth fighting for is nothing new.  But cyber security was never a real factor in water safety.   Recent incidents have e