Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

3 min read

Articles of interest from the week of December 16, 2024

Texas Teen Arrested for Scattered Spider Telecom Hacks

Chasing down members of Scattered Spider, the cybercrime group known for their social engineering takedowns of massive organizations, has been a top law enforcement priority over the past several months. Now, the Federal Bureau of Investigation has made a new arrest in the case, a 19-year-old hacker living in Fort Worth, Texas — and he's talking. (Dark Reading)

NSN Email Template v4_Expert-Take
 

“International law enforcement efforts to address cybercrime have likely seen an increase in operational success, if the recent high visibility of arrests are any indication. This is likely in part from institutional growth and improved bilateral agreements between nations. While criminal enterprises continue to exploit teenagers and young adults, the coordinated success in apprehending them may save many from becoming further entangled in activities they cannot easily escape. The additional benefit is, of course, gaining more insight into how these organizations are evolving - though this does not mean that we can relax about cybersecurity best practices. Vigilance should remain in both our professional and personal habits.”

Jessica Owens, Senior SOC Analyst at Ingalls Information Security

 

 

Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering

The Black Basta ransomware group has emerged as a significant threat, targeting over 500 organizations globally, including critical infrastructure in North America, Europe, and Australia. Known for their advanced tactics, the group employs a ransomware-as-a-service model, leveraging phishing, known vulnerabilities, and sophisticated malware for initial access. Their methods include evading detection with tools like Backstab to disable endpoint defenses, exploiting vulnerabilities like ZeroLogon, and encrypting systems to extort victims. Recent attacks highlight an alarming evolution in their techniques, making them a formidable adversary for critical sectors, including healthcare and telecommunications. Read more to understand their tactics and how to mitigate risks. (The Hacker News)

 

Spy v Spy: Russian APT Turla Caught Stealing From Pakistani APT

In a fascinating twist of cyber espionage, Russian APT group Turla has been caught stealing valuable data from another hacking group linked to Pakistan. This case highlights an unusual instance of one nation-state group targeting another, using malware to extract and repurpose stolen intelligence. The rivalry showcases the complex, cutthroat nature of modern cyber warfare, where even allies are not safe from each other's exploits. Dive deeper into this intriguing "spy-vs-spy" scenario to uncover the tactics, stakes, and broader implications of this digital conflict. (SecurityWeek)

 

Mitel MiCollab VoIP Authentication Bypass Opens New Attack Paths

A newly discovered authentication bypass vulnerability in Mitel's MiCollab VoIP platform exposes organizations to significant security risks. Researchers unveiled a proof-of-concept exploit combining path traversal and file-reading vulnerabilities, allowing attackers to access sensitive data and even elevate privileges. This flaw highlights how VoIP systems can become attractive targets for attackers seeking unconventional attack vectors. Discover how this vulnerability works, its potential impacts, and the critical measures organizations should take to secure their systems. (CSO)

 

WPForms Bug Allows Stripe Refunds on Millions of WordPress Sites

Discover a critical security flaw in WPForms, one of the most popular WordPress plugins, that could allow even the lowest-level users to issue unauthorized Stripe refunds or cancel subscriptions across millions of websites. This vulnerability, identified as CVE-2024-11205, affects versions from 1.8.4 to 1.9.2.1, exposing site owners to potential financial losses and trust erosion. Learn how to protect your site by updating to the patched version 1.9.2.2 or by temporarily disabling the plugin. Dive into the details to understand the implications and ensure your digital assets remain secure. (BleepingComputer)

 

Decade-Old Cisco Vulnerability Under Active Exploit

Cisco has recently confirmed active exploitation of a vulnerability in its Adaptive Security Appliance (ASA) software, originally identified over a decade ago. This significant security flaw, which lacks any workarounds, allows attackers to execute arbitrary code and gain complete control over affected systems. The urgency to update to an unaffected version is emphasized as there are no quick fixes, highlighting the ongoing challenge of managing legacy vulnerabilities in today's cybersecurity landscape. Dive into the full article to understand the implications and the steps organizations should take to protect their networks. (Dark Reading)

 

Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

Romania restarts presidential elections after TikTok-linked interference, cyberattacks, and alleged Russian meddling spark global scrutiny. (The Hacker News)

 

'Bootkitty' First Bootloader to Take Aim at Linux

Unveiled in late 2024, Bootkitty marks the first ever UEFI bootkit designed specifically to target Linux systems, shaking up the cybersecurity landscape previously dominated by Windows-centric threats. Developed by cybersecurity students in Korea as part of an awareness campaign, this proof-of-concept malware demonstrates the potential for sophisticated attacks on Linux, exploiting the LogoFAIL vulnerability to bypass even Secure Boot protections. With the capacity to disable kernel signature verification and preload malicious binaries, Bootkitty underscores the urgent need for Linux users to enhance their security measures against emerging threats. Read the full article to delve into the technical details and implications of this groundbreaking development. (Dark Reading)

Sign Up For Network Security News
Articles of interest from the week of August 19, 2024

Articles of interest from the week of August 19, 2024

Critical Security Lapse: National Public Data Published Its Own Passwords, Putting Millions at Risk New details are emerging about a breach at...

Read More
Articles of interest from the week of May 22, 2023

Articles of interest from the week of May 22, 2023

Inactive Accounts Pose Significant Account Takeover Security Risks Inactive and non-maintained accounts pose significant security risks to users and...

Read More
Articles of interest from the week of October 28, 2024

Articles of interest from the week of October 28, 2024

Black Basta Ransomware Poses as IT Support on Microsoft Teams to Breach Networks The BlackBasta ransomware operation has moved its social engineering...

Read More