Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

1 min read

Articles of interest from the week of July 1, 2019

Evasive Malware, Meet Evasive Phishing

In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece of malware had grown in number and sophistication—the layering of multiple techniques being its own form of sophistication. At the time, we had been digging around in our sandbox array and found that 98 percent of malware sent for analysis was using at least one evasive technique, and one-third of malwares were using a combination of six or more detection evasion techniques. Then there are malwares like Cerber ransomware, which is very sandbox aware and runs 28 evasive processes or, if you like, uses 28 techniques intended to confound security systems and thus evade detection. (By Siggi Stefnisson, Security Week

 

Two Florida Cities Paid $1.1 Million to Ransomware Hackers This Month

In the last two weeks, Florida has paid more than $1.1 million in bitcoin to cybercriminals to recover encrypted files from two separate ransomware attacks—one against Riviera Beach and the other against Lake City. (By Mohit Kumar, The Hacker News)

 

Insider Threat Detection a Serious Problem for U.S. Businesses

Preventative security technologies like firewalls and application blacklisting aren’t always enough to safeguard an organization’s IT infrastructure. Businesses often face internal threats, so a cybersecurity strategy must include tools and processes for rapid detection and response. However, strategies often don’t. (By, Filip Truta, Security Boulevard)

 

The Possibilities of AI and Machine Learning for Cybersecurity

Whether you admit it or not, artificial intelligence (AI) is here to stay. As per the latest prediction, by 2020 a vast majority of software and app developers will use AI for their products and services. Obviously, the increased role of AI into software solutions will transform the way we work, live and do our businesses. (By Juned Chanchi, The New Stack)

 

RDP BlueKeep Exploit Shows Why You Really, Really Need to Patch

About six weeks ago Microsoft took the highly unusual step of including a patch for operating systems it no longer supports in its May Patch Tuesday output. (By Mark Stockley, Naked Security

Sign Up For Network Security News
Articles of interest from the week of May 8, 2023

Articles of interest from the week of May 8, 2023

New Cactus Ransomware Encrypts Itself To Evade Antivirus A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN...

Read More

Articles of interest from the week of September 28, 2020

Why Cybercrime Spikes Around Major Events And Unrest Health pandemics, weather catastrophes, civil unrest, war — these are all unfortunate realities...

Read More

Articles of interest from the week of April 27, 2020

Researchers Exploit Almost Every Anti-Virus Software & Turn Them Into Self Destructive Tools Researchers uncovered a simple flaw that existed in...

Read More