Articles of interest from the week of May 13, 2019
Microsoft Patches ‘Wormable’ Flaw in Windows XP, 7 and Windows 2003 Microsoft yesterday took the unusual step of releasing security updates for...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : Jun 10, 2019 12:00:00 AM
Having HTTPS and a TLS certificate doesn’t mean the site isn’t a platform for scammers and thieves. (By Aaron Boyd, Nextgov)
New research, conducted by Dr. Mike McGuire of the University of Surrey, shows four in 10 Dark Web vendors are selling targeted hacking services aimed at FTSE 100 and Fortune 500 businesses. Among the information and services McGuire found on the Dark Web, access to corporate networks is sold openly, with 60% of vendors approached by researchers offering access to more than 10 business networks. (By Curtis Franklin Jr., DarkReading)
In this article, we examine the history of ransomware from its first documented attack in 1989 to the present day. We discuss in detail some of the most significant ransomware attacks and variants. Finally, we take a look at where ransomware is headed in 2018 and beyond. (By Juliana De Groot, DigitalGuardian)
Big hacks and data leaks are nothing new, but this year has seen a surge in reported breaches. The reason for this might be simple: After the EU general update to data protection regulation (GDPR) came into place in May, firms are more likely to report attacks. (By Kate O’Flaherty, Forbes)
A chief information security officer’s success rides on how they address a few crucial issues, like when to stop an IT project in the name of cybersecurity and whether the staff they hire is accountable and trustworthy. (By Dan Lohrmann, Government Technology)
Microsoft Patches ‘Wormable’ Flaw in Windows XP, 7 and Windows 2003 Microsoft yesterday took the unusual step of releasing security updates for...
Are You Prepared to Defend Against Ransomware? One of the most telling statistics from this year’s Verizon Data Breach Investigations Report (DBIR)...
Why Cybersecurity Has Become a “Team Sport” At a recent online round-table event, hosted by the New Statesman and sponsored by technology company...