Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same
An employee calls the helpdesk saying that they can’t access their files, and there’s a note on the screen saying to email the attacker to send bitcoin to get the files decrypted. The CEO is receiving emails from their contacts asking whether
Ingalls Information Security, a leader in Incident Response and technology enabled Cybersecurity Risk Management, is celebrating its 10-year anniversary!
Since 2010, we’ve been in war rooms and boardrooms, investigating computer networks targeted
With so many security products and vendors on the market, it can feel like there's no practical way to evaluate them all. Sometimes, we take the approach of selecting the product with the most recognizable brand and then hope it was the right
Your company has been attacked with Ransomware, your backups are encrypted. Or, your backups are available, but the time to restore is longer than the company can afford to be non-operational. The situation is bad, and it's about to get worse.