Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Articles of interest from the week of September 2, 2024

'Voldemort' Malware Curses Orgs Using Global Tax Authorities

The global malware campaign (that must not be named?) is targeting organizations by impersonating tax authorities, and using custom tools like Google Sheets for command and control. (Dark Reading)

NSN Email Template v4_Expert-Take
 

“He who should not be named has made a new but oh-so-familiar Horcrux. Sophisticated phishing campaigns continue to increase the risk of BEC along with a slew of other identity security issues…as if we didn’t already loathe taxes.

Although Professor Dumbledore is no longer around, steadfast allies in the form of security best practices are still the best defense against the dark arts. Namely, of attack vectors like this 'Voldemort' malware campaign. Clear protocols for handling and verifying sensitive information and training all employees on email best practices help eliminate human error as the needle moves in the threat landscape. Companies that utilize robust email filtering systems, enforce mandatory MFA, and employ SPF, DMARC, DKIM, and BIMI authentications have the best shot of not falling victim to the curse.

Candace Respress, Senior SOC Analyst at Ingalls Information Security

 

 

Owners of 1-Time Passcode Theft Service Plead Guilty

In a significant development in the fight against cybercrime, the operators behind a notorious one-time passcode theft service have pleaded guilty. This service, which compromised countless online accounts by bypassing two-factor authentication, was a major player in the underground market. Discover the intricate details of the operation, how it was taken down, and what this means for the future of online security. (KrebsOnSecurity)

 

Peach Sandstorm Deploys New Custom Tickler Malware in Long-Running Intelligence Gathering Operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which we named Tickler. Tickler has been used in attacks against targets in the satellite, communications equipment, oil and gas, as well as federal and state government sectors in the United States and the United Arab Emirates. This activity is consistent with the threat actor’s persistent intelligence-gathering objectives and represents the latest evolution of their long-standing cyber operations. (Microsoft)

 

VMware Patches High-Severity Code Execution Flaw in Fusion

On Tuesday, virtualization software technology vendor VMware pushed out a security update for its Fusion hypervisor to address a high-severity vulnerability that exposes users to code execution exploits. (SecurityWeek)

 

Researchers Find SQL Injection To Bypass Airport TSA Security Checks

Security researchers have found a vulnerability in a key air transport security system that allowed unauthorized individuals to potentially bypass airport security screenings and gain access to aircraft cockpits. (BleepingComputer)

 

Nashville Man Arrested for Running “Laptop Farm” To Get Jobs for North Koreans

Federal authorities have arrested a Nashville man on charges he hosted laptops at his residences in a scheme to deceive US companies into hiring foreign remote IT workers who funneled hundreds of thousands of dollars in income to fund North Korea’s weapons program. (Ars Technica)

 

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon, a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China, (KrebsOnSecurity)

 

A New macOS Data Stealer Is Going After Apple Users

A new threat is targeting Apple users and is designed to slip past defenses, putting your privacy at serious risk. Learn how this malware operates, who’s at risk, and what you can do to protect your data. (TechRadar)

 

Sign Up For Network Security News
Articles of interest from the week of May 27, 2024

Articles of interest from the week of May 27, 2024

New ShrinkLocker Ransomware Uses BitLocker to Encrypt Your Files A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt...

Read More
Articles of interest from the week of August 28, 2023

Articles of interest from the week of August 28, 2023

New Cyber Incident Notification Requirements for Credit Unions Beginning on September 1, 2023, all federally insured credit unions must notify the...

Read More
Articles of interest from the week of October 28, 2024

Articles of interest from the week of October 28, 2024

Black Basta Ransomware Poses as IT Support on Microsoft Teams to Breach Networks The BlackBasta ransomware operation has moved its social engineering...

Read More