Blog - Adaptus

According to the Mueller report, an FBI investigation revealed that in November 2016 the GRU “sent spear-phishing emails to over 120 email accounts used by Florida county officials responsible for administering the 2016 U.S. election” and malware embedded in Word documents in those emails enabled the GRU to gain access to “at least one Florida county government.”

Read More

As a company that suffered a data beach, UK newspaper Racing Post underwent its own rethink around security strategy, while also navigating three acquisitions that could potentially have been problematic if approached in the wrong way.

Read More

The transformative ways in which new technologies – particularly artificial intelligence – are being utilized call for deeper discussions around the ethical considerations of these deployments. Depending on the organization and its level of ambition for implementing these technologies, that might even include the need for a chief ethics officer to ensure these issues receive appropriate attention at high levels of the organization.

Read More

If you don’t collect it, no one can steal it. I’m guessing some of the people in this 200 million-record breach would agree. Sometimes the best way to secure customer data is not to collect it in the first place. While it can be tempting to “collect it all” just in case, most enterprises need […]

Read More

Researchers have found new flaws in Intel processors that could allow hackers to defeat the security boundaries enforced by virtual machine hypervisors, operating system kernels and Intel SGX enclaves, putting data on both servers and endpoint systems at risk. The new attack techniques can be used to leak sensitive secrets like passwords or encryption keys […]

Read More

First it was cloud, now it’s multi-cloud. As Australian companies ramp up their investment in as-a-service everything – Gartner predicts the annual spend will rise to $7 billion in 2021, up from $4.6 billion in 2018 – the trend of using multiple cloud computing and storage services continues to gather speed. Some of Australia’s largest […]

Read More

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden. It’s a discipline of military origins that in the computer age has become vital for […]

Read More

There are numerous factors that play into how well a phish will work. While we know that training and technical controls have varying levels of influence that are often dependent upon organization maturity, implementation of tools, and configuration of tools, what is happening in the world around us is just as important.

Read More

Cybersecurity issues are becoming a day-to-day struggle for businesses. Trends show a huge increase in hacked and breached data from sources that are increasingly common in the workplace, like mobile and IoT devices. Additionally, recent research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data loss. We’ve compiled […]

Read More

A group of attackers are actively exploiting a critical vulnerability in Atlassian’s Confluence collaboration software to infect servers with the GandCrab ransomware. Confluence is a Java-based web application that provides a shared wiki-type workspace for enterprise employees and is used by tens of thousands of companies worldwide. The vulnerability, tracked as CVE-2019-3396, is in the […]

Read More