Network Security News | Ingalls Information Security

Articles of interest from the week of March 9, 2020

Written by John Frasier | Mar 9, 2020 4:00:00 AM

Hackers are Spreading Malware through Coronavirus Maps

Cybercriminals have found yet another way to capitalize on people's fears surrounding the virus (By Anthony Spadafora, Tech Radar) Ingalls: Quickly detecting malware on your endpoints and network can give you the chance to isolate it before it executes. Ingalls' Endpoint Detection and Responselets you find and destroy malware before it executes. Our AI driven software platform enables dynamic threat detection and immediate remediation efforts.


Threat Awareness: A Critical First Step in Detecting Adversaries

One thing seems certain: Attackers are only getting more devious and lethal. Expect to see more advanced attacks. (By Dan Schiappa, Dark Reading) Ingalls: Our MDR (Managed Detection and Response) services offer layered cybersecurity controls for effective risk management and rapid response. It was designed to be a method of proactive prevention against security threats to your environment, especially zero-day threats, making it one of the industry's leading cybersecurity tools. MDR is critical when it comes to staying ahead of all kinds of threats, detecting and stopping them before they become breaches.


Microsoft Warns Of ‘Devastating’ Cybersecurity Threat: Here's What You Need To Know

Microsoft's threat protection intelligence team has warned of a "significant and growing" cybersecurity threat that can deliver a devastating payload. (By Davey Winder, Forbes) Ingalls: Ransomware has become a serious threat to businesses of all sizes and industries, and traditional security practices are no longer strong enough to protect your business: early detection and response is key. Are you prepared to defend against ransomware?


3 Data Breaches Disclosed This Week: J.Crew, T-Mobile, and Carnival

The separate incidents show how data theft knows no market-based limits. (Dark Reading) Ingalls: Having spent the last decade in war rooms and boardrooms investigating attacks by criminals and nation-state sponsored hackers, our team understands how to prevent and respond to cyber attacks. Even with the best controls in place, a security incident can still happen. In fact, when we talk in terms of incident response, it may not necessarily refer to a breach, but an attempted breach. Regardless, whatever is responsible for triggering a response, our team of experts has the experience to resolve cyber attacks quickly and discreetly in order to get you back to normal as fast as possible.


Hackers are Compromising Vulnerable ManageEngine Desktop Central Instances

Is your organization using ManageEngine Desktop Central? If the answer is yes, make sure you’ve upgraded to version 10.0.474 or risk falling prey to attackers who are actively exploiting a recently disclosed RCE flaw (CVE-2020-10189) in its software. (By Zeljka Zorz, Help Net Security) Ingalls: Enhancing your patch management process to include vulnerability scanning, a robust remediation workflow, and metrics-based decision support from data collection can do a lot more for your risk management than simply plugging holes whenever a software vendor produces a patch. In our downloadable “8 Effective Cybersecurity Controls For SMBs” guide we discuss how to do more with patch management, and the benefits of a mature Vulnerability Lifecycle Management program.