Articles of interest from the week of June 1, 2020
Office 365 Phishing Baits Remote Workers With Fake VPN Configs Microsoft Office 365 customers are targeted by a phishing campaign using bait messages...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
A majority of firms expect to keep more employees working remotely post-pandemic, forcing businesses to undertake more comprehensive digital and cloud transformations. (By Robert Lemos, DarkReading) Ingalls: Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection and response guidance utilizing a defense-in-depth approach which monitors and correlates network activity with endpoints, logs and everything in between.
People aren’t protecting themselves from cybersecurity risks even though they know they should, a study on password psychology by LogMeIn reveals. (By Help Net Security) Ingalls: We strongly recommend to always enable two-factor authentication (2FA) or multi-factor authentication (MFA) when possible. If your MFA solutions fails, make sure your business has a plan to deal with the emergency. Our blog post provides useful information on how to build a cybersecurity incident response plan.
While threat reports show ransomware attacks against healthcare organizations are down, experts say threat actors may be lurking in networks and waiting to strike at a later date. (By Alexander Culafi, SearchSecurity.com) Ingalls: We have seen first-hand, through incidents we have work, how attackers would wait days, weeks or even months after the initial compromise before deployment. Are you prepared to defend against ransomware?
WordPress administrators are being urged to ensure all of their plug-ins are up-to-date, after researchers detected a 30-fold increase in attack traffic targeting mainly cross-site-scripting vulnerabilities. (By Phil Muncaster, Infosecurity)
In the last few months, multiple groups of attackers successfully compromised corporate email accounts of at least 156 high-ranking officers at various firms across the globe. (By Mohit Kumar, The Hacker News) Ingalls: Phishing is one of the most widely used cyber-attack vectors. Even the most trained and sophisticated users can get tricked into divulging their credentials or clicking on malicious links. A very powerful solution that we've helped many clients with is the Phishing Email Helpdesk. Reach out to us today if you would like to know more about Security Awareness Training and Social Engineering.
Office 365 Phishing Baits Remote Workers With Fake VPN Configs Microsoft Office 365 customers are targeted by a phishing campaign using bait messages...
1 min read
FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals On Monday, Oct. 26, KrebsOnSecurity began following up on a tip...
FBI Warns of Maze Ransomware Focusing on U.S. Companies Organizations in the private sector received an alert from the F.B.I. about operators of the...