Articles of interest from the week of February 10, 2020
Hacks on Louisiana Parishes Hint at Nightmare Election Scenario Expert believes November ransomware attacks timed to election, ‘A very dangerous...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : Aug 22, 2022 12:00:00 AM
Four years into its existence, a cybersecurity and intelligence-sharing operation built for state and local election officials now numbers more than 3,400 members, has added several new products, and has become a mainstay of a once-skeptical community of election administrators scattered across the country.
Amid that growth, though, and rising staff turnover at individual election offices, the Election Infrastructure Information Sharing and Analysis Center, or EI-ISAC, is “reintroducing” itself, the operation’s director, Marci Andino, told StateScoop this week. (StateScoop)
Experts told Protocol that the Chinese government’s efforts to steal intellectual property require more attention from targeted businesses — and in some cases, a different approach to cyber defense. (Protocol)
An insufficient validation input flaw, one of 11 patched in an update last week, could allow for arbitrary code execution and is under active attack. (Threatpost)
Researchers demonstrate a proof of concept where hijacked programmable logic controllers can compromise engineering workstations to allow lateral movement. (CSO)
The vast majority of ransomware attacks begin with cyber criminals exploiting common cybersecurity errors, which – if correctly managed – could prevent most victims from falling prey to attacks. Microsoft analyzed anonymized data of real threat activity and, according to the company's new Cyber Signals report, found that over 80% of ransomware attacks can be traced to common configuration errors in software and devices. (ZDNet)
Hacks on Louisiana Parishes Hint at Nightmare Election Scenario Expert believes November ransomware attacks timed to election, ‘A very dangerous...
Why Cybersecurity Has Become a “Team Sport” At a recent online round-table event, hosted by the New Statesman and sponsored by technology company...
Warning: Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency Mining Poorly secured Linux SSH servers are being targeted by bad actors to...