If you suspect an active attack on your buisness, call our emergency hotline at: 612-399-9680
If you suspect an active attack on your business, call our emergency hotline at: 612-399-9680

War Stories and Other Helpful Information

The Blog

Cybersecurity News 2021: Year in Review

This year is on its way out, but before we say goodbye, let’s take stock of the major 2021 cybersecurity events. As we’ll see, the major attacks used ransomware, attackers demanded millions of dollars in exchange for decryption tools, and attacked companies usually paid up. And while 2 out of 3 of Americans are “very concerned” about hackers, by October there were already more data breaches for 2021 than there were in all of 2020. 2021 is poised to set a single-year record for these transgressions. Attacks While we could point to many different cyber attacks from 2021, here are

Read More »

Apache Log4j Vulnerability

What is the Apache Log4j Vulnerability? The Log4j vulnerability allows threat actors to execute code remotely on a targeted computer. What is Log4j? Log4j is a Java library for logging error messages in applications. What is Log4j used for? Log4j is used in both consumer and enterprise services to log security and performance information. It is used in websites, applications, and operational technology products. What versions of Apache’s Log4j are affected by the vulnerability? Apache’s Log4j software library, versions 2.0-beta9 to 2.14.1, known as “Log4Shell” and “Logjam.” How to protect against the Log4j vulnerability: Prioritize patching. Enumerate internet-facing endpoints that

Read More »

Ransomware: Why Are Small to Medium Businesses Targeted Most Often?

According to a survey of managed service providers for SMEs, only 30 percent felt that ransomware was a critical threat, perhaps indicating an attitude that it only affects larger corporations. This couldn’t be further from the truth. In fact, a single ransomware “gang” took on 63 companies in 2021 so far, including schools, local government agencies and healthcare services. Smaller businesses may, in fact, be more at risk because of several factors. Lack of Cybersecurity Training Any company that connects to the internet and holds data of any kind is at risk from threat actors. This means every organization is at

Read More »

GoCD Vulnerability Allows Potential for Supply Chain Attacks

GoCD has released a security update to their critical authentication vulnerability discovered by SonarSource, a Swiss security firm. The popular (and free) open-source, Java-run Continuous Integration and Continuous Delivery System (CI/CD) is a broadly used piece of infrastructure, and its misuse has the potential for massive disruptions. Unauthorized attackers could use this vulnerability to extract encrypted data, create backdoors in internal or external software, or impersonate a GoCD Agent. Attackers could also obtain control over both software delivery pipelines and GoCD servers and execute arbitrary code on them. Ultimately, this weakness has the potential for massive supply chain attacks. The

Read More »

Cybersecurity Awareness Month 2021 Recap

The month of October is Cybersecurity Awareness Month. Threat actors never rest, and it is always important to do your part to keep you and your company’s information as safe as possible. In October, we accumulated a wide assortment of cybersecurity tips and tricks covering topics like phishing, working in a hybrid workplace, and general cybersecurity, as well as why you should consider a cybersecurity career. The following graphic contains an overview of this information.

Read More »
Prioritizing cybersecurity in a hybrid workplace

Prioritizing Cybersecurity in a Hybrid Workplace

In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023, and the number of installed connected devices in the home is expected to rise by a staggering 70% by 2025. In this new normal where smart devices and consequently online safety are a must, here are some tips for securing those devices. Remember smart devices need smart security

Read More »
3 Reasons to Consider a Career in Cybersecurity

3 Reasons to Consider a Career in Cybersecurity

Cybersecurity is one of the hottest industries today, with new threats and challenges emerging constantly. This means there is a huge push by both business and education sectors to attract individuals toward a degree and career in cybersecurity. Are you interested in joining this exciting workforce? Here are a few reasons why pursuing a career in cybersecurity might be right for you. Growing Job Market The cybersecurity job market is growing at an incredibly fast rate, due to the rising number of cyber challenges and threats. According to the U.S. Bureau of Labor Statistics, the job market for information security

Read More »
3 Tips to help deal with phishing threats

Three Tips to Help Deal with Phishing Threats

Although new threats that are cropping up in the cybersecurity space – phishing — one of the oldest pain points in cybersecurity — is continuing to wreak havoc. Phishing is one of the most dangerous “action varieties” to an organization’s cybersecurity health. Phishing has been a mainstay in the cybersecurity threat landscape for decades, even though its not talked about much in the media. Because it continues to work, phishing is still a common tactic used by threat actors. In 2020, 74 percent of US organizations experienced a successful phishing attack. In addition, 43 percent of cyberattacks in 2020 featured

Read More »

Five Simple Tips to Mitigate Cyber Risk

Being cyber smart is the best way to protect yourself and others from cyber attacks. In honor of Cyber Security Awareness Month, Blue Team Alpha has compiled 5 simple tips to mitigate your cyber risk. Following these tips is easy, and free. Using all of these tips together can make a real difference for taking control of your online presence. But it’s important to keep in mind that no single tip is full proof on it’s own. Read on to learn 5 simple tips to mitigate your cyber risk that you can implement today. 1) Use strong passphrases/password manager While

Read More »

September 2021 Microsoft Exchange Proxyshell Vulnerability

September 2021 Microsoft Exchange Proxyshell Vulnerability What is the September 2021 Microsoft Exchange Proxyshell Vulnerability? Exchange servers are under attack, again. These are not the Hafnium Webshells, these are Proxyshells that are being used to compromise onsite Exchange environments. Microsofts latest patch may not be effective in keeping your Exchange environment safe.   Indicators of compromise: One indicator of compromise is draft emails that were not created by the mailbox owner.   Associated CVE’s:  CVE-2021-31207  CVE-2021-34473  CVE-2021-34523  Is there a patch available? There was a patch made available by Microsoft on August 24th 2021. These patches and vulnerabilities are now under review

Read More »
Subscribe To Our Blog
Blue Team Alpha - First 5 Things You Need To Do
Ransomware Response Checklist