Articles of interest from the week of July 15, 2019
Cybercriminals are Increasingly Targeting the Financial Services Industry Universally, consumers and small and large businesses alike, are...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : May 16, 2022 12:00:00 AM
The U.S. Cybersecurity and Infrastructure Agency issues an emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit. (By Zeljka Zorz, Help Net Security)
Here at Ingalls, we are committed to the evolution and continual improvement of all our service offerings and are proud to announce the release of our Phalanx MDR Add-on designed to stop cyber threats at the human layer. Visit our blog for details.
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows. (By Jai Vijayan, Dark Reading)
46% of IT, security, and cybersecurity leaders say they still store passwords in shared office documents. That’s despite an overwhelming 93% of respondents that require password management training, with 63% holding training more than once per year, according to a survey conducted by Pulse on behalf of Hitachi ID. (By Help Net Security)
Security researchers are warning that along with phishing and exploiting vulnerabilities in a public-facing application, these are the primary methods of compromise that ultimately lead to threat actors stealing data and encrypting systems. (By Ionut Ilascu, Bleeping Computer)
Cybercriminals are Increasingly Targeting the Financial Services Industry Universally, consumers and small and large businesses alike, are...
Cyber-Insurance Firms Limit Payouts, Risk Obsolescence Companies will need to re-evaluate their cyber-insurance premiums after major insurance...
ConnectWise Control Security Issues Are Tip Of Iceberg For MSPs Using RMM Tools The ConnectWise Control security vulnerabilities disclosed this week...