Articles of interest from the week of August 22, 2022
The Election Infrastructure-ISAC Wants To ‘Reintroduce’ Itself Four years into its existence, a cybersecurity and intelligence-sharing operation...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : Aug 26, 2019 12:00:00 AM
A new email phishing scam involving false claims about electronically filed tax returns was reported Aug. 22 by the IRS. (By Michael Trimarchi, Bloomberg Tax)
Ransomware has rapidly emerged as the most visible cybersecurity risk playing out across our nation’s networks, locking up private sector organizations and government agencies alike. And that’s only what we’re seeing – many more infections are going unreported, ransoms are being paid, and the vicious ransomware cycle continues on. We strongly urge you to consider ransomware infections as destructive attacks, not an event where you can simply pay off the bad guys and regain control of your network (do you really trust a cybercriminal?). (By the Cybersecurity and Infrastructure Security Agency, Department of Homeland Security)
A round of phishing emails purports to be from job seekers – but actually uses a slew of detection evasion tactics to download malware on victim systems. (By Lindsey O'Donnell, ThreatPost)
Robust IT security programs are a must for any organizations that rely more and more on information system infrastructures to manage data, activities, business procedures and relations with clients. As so much is stored and processed through a company’s IT systems, no business, regardless of size and type of industry, is safe from attackers and malicious hackers. (By Daniel Brecht, Infosec)
Cybercriminals often exploit victims' familiarity with popular brands to manipulate them into falling for phishing campaigns. Microsoft is the most common brand to spoof, researchers report, with PayPal in second place and Facebook rapidly catching up in a close third. (By Kelly Sheridan, DarkReading)
The Election Infrastructure-ISAC Wants To ‘Reintroduce’ Itself Four years into its existence, a cybersecurity and intelligence-sharing operation...
1 min read
Security Breaches Where Working From Home Is Involved Are Costlier, Claims IBM Report Firms looking to save money by shifting to more flexible ways...
1 min read
FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals On Monday, Oct. 26, KrebsOnSecurity began following up on a tip...