Blog - Adaptus

Based on recent activity in the middle-east, MSSP Alert reports on insights from the Cybersecurity and Infrastructure Security Agency (CISA) about potential Iranian attacks on the United States and related infrastructure.

Read More

It's been nagging at you for years, but now is the time to act as the cost of doing nothing will not only cost you your job, but the company millions.

Read More

We're pleased to be recognized as a "10 Best Startups to Watch in 2019" by the Silicon Review. Read the full article here.

Read More

Despite their size, SMB customers are absolutely a target of hackers, who are ‘making a ton of money off of your customers,’ Webroot executive Sarah Morgan tells solution providers at XChange 2019.

Read More

This is a great article about integrating cybersecurity solutions to address multiple endpoints, which is exactly why we designed the cloud-based EZProtect antivirus to scan both Salesforce and all connected applications handling attachments (Mulesoft for example) in real-time.

Read More

The malicious content (viruses, ransomware, malware) stays within each attachment uploaded to Salesforce and is essentially waiting to be unleashed — costing agencies millions of dollars in damages and fees. The issue is when the files are opened or forwarded to another contact for signature, what happens next.

Read More

Voters must have confidence that the voting was fair, regardless of how much money is spent or what security controls are put in place. That makes securing election infrastructure categorically different than almost any other information security challenge today.

Read More

CISA is responsible for protecting the nation’s critical infrastructure from physical and cyber threats. Its mission is to “build the national capacity to defend against cyber attacks” and to work “with the federal government to provide cybersecurity tools, incident response services and assessment capabilities to safeguard the .gov networks that support the essential operations of partner departments and agencies.”

Read More

It is also believed that the “1800ForBail” campaign is part of a large-scale campaign, that aims at exploiting newly found flaws in WordPress.

Read More

Traditional phishing attacks that most people are familiar with consist of fake login pages hosted on attacker-controlled web servers and served from custom domains whose names are similar to those of the targeted websites. However, such static attacks are not effective against online services that use two-factor authentication, because there is no interaction with the legitimate websites to trigger the generation of one-time-use codes.

Read More