SIM Swapping Attacks: A Surprisingly Common Cyberthreat

Author: Robert James Collie, Intelligence Analyst SIM swapping attacks quintupled from 2021 to 2022. Potential consequences of this cyberattack include monetary theft and reputational harm. Anyone may be targeted by a SIM swapping attack and the impacts can extend far beyond the individual who is targeted to include professional or personal networks. In this post, […]
Fox Bravo Overland and Red Hands Helping Honor Heroes with Wilderness Therapy Out West

By Kris Coleman, Founder, President and CEO of Red Five Security Red Hands Helping, the charitable arm of Red Five Security, supported Fox Bravo Overland this summer in getting first responders and veterans into the wild for some nature therapy amongst peers. Fox Bravo was started back in 2017 with a handful of former veterans and […]
Protests and Disruptive Activity Likely Through the Weekend Following Hamas Calls for Global Protests

Author: Nick Nemtuda, Intelligence Analyst International calls to protest by the former Hamas chief will likely lead to an uptick of demonstrations in support of Palestine worldwide through the weekend. Protest activity probably will increase in the next few weeks in response to the changing security situation and number of civilian casualties. Peaceful protests probable, […]
Hamas’ Use of Social Media & How to Protect Your Family

Author: Kelly Shemansky, Red Five Security The recent use of social media by Hamas presents an increased risk of exposure to harmful content to social media users, including families. This week, as everyone’s social media feeds are flooded with content covering the Israel-Hamas war, it is important to remember that the “barrier for entry” to […]
Best Practices for Internal Threat Teams During a Crisis

Author: Karna McGarry, Vice President of Managed Services, Red Five Security The recent violence in Israel is a stark reminder of how quickly the security environment can change—often without warning—and raises the risk for a company’s safety of personnel, facilities, and operations. The war in Ukraine continues and other threats loom, which can overwhelm your threat […]
Smart Home Devices: Concerns, Vulnerabilities, and How to Address Them

Author: Garrett Bell (Analyst, Security Consulting) The idea of a “smart home,” a home filled with connected devices that conveniently streamline entertainment, security, lighting, and other functions, has grown in popularity in recent years evidenced by the growing number of connected devices in American households. US households have approximately 22 connected devices on average, according […]
A Threat No One Can Ignore: The Threat of Ransomware Expands to Include Small and Medium Size Businesses

Author: Nick Nemtuda, Red Five OSINT Analyst You likely heard about, and may have been affected by, the Colonial Pipeline Company ransomware attack in May 2021, but you probably are unaware of the ransomware attack that targeted Lincoln College later that year, forcing the institution to close in May 2022. This is because after years […]
5 Benefits of a Corporate Travel Risk Program

Authored by: Nikki Desai (Associate Director, Security Consulting) An effective travel risk program is a key tool in any company’s risk management effort. Travel risk programs provide end-to-end service for traveling employees, starting from when the employee’s trip is planned up until the employee’s safe return home. The process typically begins with a risk assessment […]
What Are Data Aggregators and How Do They Pose a Risk to Your Privacy and Security?

Authored by: Aaniyah Hicks, Red Five Investigative Intern What are Data Aggregators? Data aggregators, also known as people-finder sites, scour the internet looking for people’s personally identifiable information (PII) in order to compile easily accessible online profiles of the individual. Data aggregators pull your information from a variety of public sources, including public records such as […]
What’s The Big Deal About TikTok and What Can You Do to Protect Your Data

TikTok is an extremely popular short-form video social media platform that has attracted more than 150 million active users in the US. It has garnered so much attention—and ire—from the federal government, state governments, international bodies, and private institutions due to its popularity, the dangers associated with the platform’s data collection, and the potential […]