Unveiling CVE-2023-4863: WebP’s Hidden Threat
In recent weeks, our digital landscape has been marked by a flurry of browser updates. These updates were not driven by routine maintenance but by
In recent weeks, our digital landscape has been marked by a flurry of browser updates. These updates were not driven by routine maintenance but by
Introduction – Virus vs. Malware Most people use the terms “virus” and “malware” interchangeably to describe various forms of digital threats. However, these two terms
Introduction Technology Source, a Technology Advisory Firm in Southern CA, interviewed executives from Blue Team Alpha, a Cybersecurity & Incident Response Firm headquartered in Minneapolis,
Introduction Technology Source, a technology advisory firm in Southern CA, interviewed executives from Blue Team Alpha, a comprehensive cybersecurity force headquartered in St. Paul, MN.
Why do attacks increase over the holidays? In a joint cybersecurity advisory, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) warn that cyberattacks increase significantly during
Identified: May 27, 2022 Name of Vulnerability: Microsoft Office Zero Day Follina Description of Vulnerability: A new zero-day vulnerability, Microsoft Office Zero Day Follina, was
Vulnerabilities in VMWARE allow internal attackers to gain unauthenticated administrative access to the entire company’s infrastructure. Who is affected: Anyone using: VMware Workspace ONE Access (Access)
Ask the Experts The question: What are the most critical cyber threats of 2022? was posed to a panel that included Blue Team Alpha cyber
What is the Vulnerability? The VMware Backdoor vulnerability is labeled CVE-2022-22954. By Exploiting the VMware IDM Service, attackers are able to run powershell to create
What is the Vulnerability? A vulnerability in the Cisco Umbrella Virtual Appliance (VA) was discovered last week by Fraser Hess of Pinnacol Assurance (tracked as
What Occurred? Oracle has issued a Critical Patch Update which contains 520 new security patches across various product families. A few of these updates need
What is the Tarrask Malware? The Tarrask malware utilizes Windows scheduled tasks to maintain persistence on compromised hosts. An admin can profile the usage of
Who is HAFNIUM? HAFNIUM is a threat actor that historically targeted entities in the United States for the purpose of exfiltrating information from industry sectors.
Ask the Experts The question: Why Do Cyber Threats Keep Happening? Was posed to a panel that included Blue Team Alpha cyber experts Joe Kingland
Who is Lapsus$? Lapsus$, also tracked by Microsoft’s Threat Intelligence Center (MSTIC) as DEV-0537, is a relatively new English/Portuguese online extortion group that gained notoriety
Quick Response (QR) codes, first developed in Japan in the 1990s, are square shaped codes that can be used for a variety of purposes. With
The Threat Sandworm Sandworm, a Russian-backed hacking group, was attributed to the NotPetya attack on Ukraine in 2017. It now has developed new malware, Cyclops
Contact