Unveiling CVE-2023-4863: WebP’s Hidden Threat
In recent weeks, our digital landscape has been marked by a flurry of browser updates. These updates were not driven by routine maintenance but by our growing awareness of a
In recent weeks, our digital landscape has been marked by a flurry of browser updates. These updates were not driven by routine maintenance but by our growing awareness of a
Introduction – Virus vs. Malware Most people use the terms “virus” and “malware” interchangeably to describe various forms of digital threats. However, these two terms have distinct meanings and characteristics
Introduction Technology Source, a Technology Advisory Firm in Southern CA, interviewed executives from Blue Team Alpha, a Cybersecurity & Incident Response Firm headquartered in Minneapolis, MN. The ever-evolving landscape of
Introduction Technology Source, a technology advisory firm in Southern CA, interviewed executives from Blue Team Alpha, a comprehensive cybersecurity force headquartered in St. Paul, MN. The ever-evolving landscape of cyberthreats
Why do attacks increase over the holidays? In a joint cybersecurity advisory, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) warn that cyberattacks increase significantly during the holidays and encourage businesses
Identified: May 27, 2022 Name of Vulnerability: Microsoft Office Zero Day Follina Description of Vulnerability: A new zero-day vulnerability, Microsoft Office Zero Day Follina, was discovered in Microsoft Office when
Vulnerabilities in VMWARE allow internal attackers to gain unauthenticated administrative access to the entire company’s infrastructure. Who is affected: Anyone using: VMware Workspace ONE Access (Access) VMware Identity Manager (vIDM) VMware
Ask the Experts The question: What are the most critical cyber threats of 2022? was posed to a panel that included Blue Team Alpha cyber experts Joe Kingland – CEO;
What is the Vulnerability? The VMware Backdoor vulnerability is labeled CVE-2022-22954. By Exploiting the VMware IDM Service, attackers are able to run powershell to create malicious communications to the server.
What is the Vulnerability? A vulnerability in the Cisco Umbrella Virtual Appliance (VA) was discovered last week by Fraser Hess of Pinnacol Assurance (tracked as CVE-2022-20773). The flaw is in
What Occurred? Oracle has issued a Critical Patch Update which contains 520 new security patches across various product families. A few of these updates need urgent attention if you are
What is the Tarrask Malware? The Tarrask malware utilizes Windows scheduled tasks to maintain persistence on compromised hosts. An admin can profile the usage of the Task Scheduler GUI or
Who is HAFNIUM? HAFNIUM is a threat actor that historically targeted entities in the United States for the purpose of exfiltrating information from industry sectors. It has engaged in a
Ask the Experts The question: Why Do Cyber Threats Keep Happening? Was posed to a panel that included Blue Team Alpha cyber experts Joe Kingland – CEO; Dan Wolfford –
Who is Lapsus$? Lapsus$, also tracked by Microsoft’s Threat Intelligence Center (MSTIC) as DEV-0537, is a relatively new English/Portuguese online extortion group that gained notoriety after attacking Brazil’s Ministry of
Quick Response (QR) codes, first developed in Japan in the 1990s, are square shaped codes that can be used for a variety of purposes. With their ability to store a
The Threat Sandworm Sandworm, a Russian-backed hacking group, was attributed to the NotPetya attack on Ukraine in 2017. It now has developed new malware, Cyclops Blink, which targets firewall devices
Contact