Cybersecurity Experts Weigh in on Why Cyber Threats Keep Happening
Ask the Experts The question: Why Do Cyber Threats Keep Happening? Was posed to a panel that included Blue Team Alpha cyber experts Joe Kingland
Ask the Experts The question: Why Do Cyber Threats Keep Happening? Was posed to a panel that included Blue Team Alpha cyber experts Joe Kingland
Who is Lapsus$? Lapsus$, also tracked by Microsoft’s Threat Intelligence Center (MSTIC) as DEV-0537, is a relatively new English/Portuguese online extortion group that gained notoriety
Quick Response (QR) codes, first developed in Japan in the 1990s, are square shaped codes that can be used for a variety of purposes. With
Reports show that globally, in 2021, the number of ransomware attacks increased significantly. Not only did the level of frequency grow, but so did their
In 2020, the FBI reported a whopping $2.7B as the cost of cybercrimes in just that year. While no business is immune to cybersecurity attacks,
The Threat Sandworm Sandworm, a Russian-backed hacking group, was attributed to the NotPetya attack on Ukraine in 2017. It now has developed new malware, Cyclops
Searching for a new job is hard enough without also worrying about employment scams. Unfortunately, fraudulent job postings have always been around, and thanks to
How Much Money Does Your Incident Response Team Make on Ransom Payments? A common trend in the cybersecurity space is incident response teams making a
Managed service providers (MSP) and managed security service providers (MSSP) are both incredibly useful tools for businesses, but there is one major difference that sets
This year is on its way out, but before we say goodbye, let’s take stock of the major 2021 cybersecurity events. As we’ll see, the
What is the Apache Log4j Vulnerability? The Log4j vulnerability allows threat actors to execute code remotely on a targeted computer. What is Log4j? Log4j is
According to a survey of managed service providers for SMEs, only 30 percent felt that ransomware was a critical threat, perhaps indicating an attitude that it
GoCD has released a security update to their critical authentication vulnerability discovered by SonarSource, a Swiss security firm. The popular (and free) open-source, Java-run Continuous
The month of October is Cybersecurity Awareness Month. Threat actors never rest, and it is always important to do your part to keep you and
In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on
Cybersecurity is one of the hottest industries today, with new threats and challenges emerging constantly. This means there is a huge push by both business
Although new threats that are cropping up in the cybersecurity space – phishing — one of the oldest pain points in cybersecurity — is continuing
Being cyber smart is the best way to protect yourself and others from cyber attacks. In honor of Cyber Security Awareness Month, Blue Team Alpha
Microsoft Exchange Proxyshell Vulnerability What is the September 2021 Microsoft Exchange Proxyshell Vulnerability? Exchange servers are under attack, again. These are not the Hafnium Webshells,
On July 2nd, 2021, Kaseya, an IT solutions developer for MSPs and enterprise clients, announced that it had become victim to a cyberattack. Kaseya immediately encouraged its customers to shut down VSA (Virtual System/Server Administrator) servers in order to prevent further access to attackers.
Contact