Under Attack? Contact Us Start a Free Demo

Art Appraisal Blog

Category - Uncategorized

07/19/2022
Uncategorized

Why is Blue Teaming Important For Improved Cyber Security?

What is Blue Teaming? Blue teams are responsible for assessing organizational security posture and defending the company from cyber threats. They are considered the watchdogs of the organization. Blue Teaming is an activity that involves a blue team and red team where the blue team aims to defend and thwart red team attacks as the red team in an organization plays the role of an attacker by identifying security gaps...

Views 0
Read more
07/19/2022
Uncategorized

How Can Purple Team Enhance Your Cyber Security Posture?

What is Purple Team in Cyber Security? A Purple Teams are a group of cybersecurity experts that take on the roles of both a Blue Team and Red Team to deliver a more tailored, realistic security assessment to the organization being tested.  The purple teaming strategy involves red and blue teams collaborating closely to maximize cyber capabilities through continuous feedback and knowledge transfer. Purple team exercises combine defense and offense,...

Views 0
Read more
07/19/2022
Uncategorized

Follina Vulnerability (CVE-2022-30190)

Summary A zero-day vulnerability known as Follina (CVE-2022-30190) was identified where it is a Remote Code Execution (RCE) vulnerability found in the Microsoft Windows Support Diagnostic Tool (MSDT). The Chinese government-affiliated TA413 CN APT group was found exploiting this vulnerability since it was discovered, and initial attacks have been observed in the Philippines, Nepal, and India. This MSDT tool is typically used as a troubleshooting wizard (collecting and submitting system information...

Views 0
Read more