Disruptive cyberattacks pose a threat to critical infrastructure

Disruptive cyberattacks pose a threat to critical infrastructure

A recent letter from the White House states that critical infrastructure, specifically water and wastewater systems, is a major target for foreign state-sponsored threat actors. In this letter, the White House requested the cooperation of governors and invited state environmental, homeland security, and health agencies to a meeting to discuss the cybersecurity of the nation’s […]

Adding to Chrome: Part 3 – Discoveries and Suggestions

In the first two installments of this blog series (Part 1 and Part 2), we explored some high-level concepts related to browser extensions and their security implications and then how we went about analyzing them. In this third blog we explore some of our findings and general recommendations on whether or not you should click […]

Uncovering the Phemedrone Stealer: Analyzing the Threat and Detection Methods

Recently, the cybersecurity world has been abuzz with discussions about Phemedrone, a newly emerged stealer exploiting the CVE-2023-36025 vulnerability in Microsoft Windows Defender SmartScreen. The project was most recently available on GitHub; however, the project was taken down, and the associated account was removed. Active development still occurs via Telegram. Phemedrone distinguishes itself as a […]

Exploring Entity Behavior Beyond Logs on the Splunk Platform

Searching for bad actors within your organization can be challenging, like trying to find a needle in a haystack. To uncover these bad actors, we can utilize anomaly detection using the Splunk Platform (specifically Splunk Cloud Platform or Splunk Enterprise). By leveraging lookups, averages, and standard deviations, we can create behavior profiles and accurately identify […]

Insight into Security Vulnerabilities in JetBrains TeamCity: CVE-2024-27198 and CVE-2024-27199

Two critical vulnerabilities have been exposed in JetBrains TeamCity On-Premises versions up to 2023.11.3. Identified by Rapid7’s vulnerability research team in February 2024, CVE-2024-27198 and CVE-2024-27199 pose a significant threat, enabling unauthenticated attackers to potentially gain administrative control or execute code remotely on affected TeamCity servers. CVE-2024-27198, categorized under CWE-288, highlights an authentication bypass vulnerability […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.