Articles of interest from the week of March 1, 2021
Ransomware, Phishing Will Remain Primary Risks in 2021 Cybercriminals and nation-states have doubled down and improved on popular attacks, targeting...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : Aug 22, 2022 12:00:00 AM
Four years into its existence, a cybersecurity and intelligence-sharing operation built for state and local election officials now numbers more than 3,400 members, has added several new products, and has become a mainstay of a once-skeptical community of election administrators scattered across the country.
Amid that growth, though, and rising staff turnover at individual election offices, the Election Infrastructure Information Sharing and Analysis Center, or EI-ISAC, is “reintroducing” itself, the operation’s director, Marci Andino, told StateScoop this week. (StateScoop)
Experts told Protocol that the Chinese government’s efforts to steal intellectual property require more attention from targeted businesses — and in some cases, a different approach to cyber defense. (Protocol)
An insufficient validation input flaw, one of 11 patched in an update last week, could allow for arbitrary code execution and is under active attack. (Threatpost)
Researchers demonstrate a proof of concept where hijacked programmable logic controllers can compromise engineering workstations to allow lateral movement. (CSO)
The vast majority of ransomware attacks begin with cyber criminals exploiting common cybersecurity errors, which – if correctly managed – could prevent most victims from falling prey to attacks. Microsoft analyzed anonymized data of real threat activity and, according to the company's new Cyber Signals report, found that over 80% of ransomware attacks can be traced to common configuration errors in software and devices. (ZDNet)
Ransomware, Phishing Will Remain Primary Risks in 2021 Cybercriminals and nation-states have doubled down and improved on popular attacks, targeting...
Why Ransomware Attacks on Municipalities Spiked in 2019 Ransomware spread to a number of city, state and local governments across the U.S. in 2019....
Next Generation Cyber: Malware-Free Attacks While the majority of the traditional cybersecurity solutions are focused on stopping malware, the threat...