Blog - Adaptus

Voters must have confidence that the voting was fair, regardless of how much money is spent or what security controls are put in place. That makes securing election infrastructure categorically different than almost any other information security challenge today.

Read More

CISA is responsible for protecting the nation’s critical infrastructure from physical and cyber threats. Its mission is to “build the national capacity to defend against cyber attacks” and to work “with the federal government to provide cybersecurity tools, incident response services and assessment capabilities to safeguard the .gov networks that support the essential operations of partner departments and agencies.”

Read More

It is also believed that the “1800ForBail” campaign is part of a large-scale campaign, that aims at exploiting newly found flaws in WordPress.

Read More

Traditional phishing attacks that most people are familiar with consist of fake login pages hosted on attacker-controlled web servers and served from custom domains whose names are similar to those of the targeted websites. However, such static attacks are not effective against online services that use two-factor authentication, because there is no interaction with the legitimate websites to trigger the generation of one-time-use codes.

Read More

A culture of blame and fear when it comes to security means end users won’t tell you if they are using an unsanctioned app, have clicked on a malicious link or have seen unusual activity until it’s too late. Security teams should empower users with a culture of personal responsibility so that they treat data security in the same way they approach other company policies like health and safety.

Read More

Like other types of malware, a Trojan is deployed by attackers to damage or take control of your computer. Its name comes from the method by which it infects your computer: it disguises itself as something you want in order to trick you into letting it through your defenses.

Read More

The 5G race is on, and China holds an ominous advantage 5G is going to touch every company and person in the next year or two, as service providers drive new high-bandwidth offerings.  But currently, as discussed in a Beltway conference a few weeks ago – raising the anxiety of the audience – China is […]

Read More

Researchers have devised a new attack that allows unprivileged code running on computers to steal secrets, such as cryptographic keys, that are stored in what should be protected memory regions. The attack is possible because of a known design issue with modern DRAM chips that has been exploited in the past to modify protected data. […]

Read More

With the addition of the EZProtect (ODS) API, any cloud-based or on-premises application with an API (such as Box.com, Sharefile, Office 365 OneDrive, Mulesoft, Boomi, etc.) may also connect to EZProtect enabling enterprise-wide virus scanning of files with centralized reporting.

Read More

In 2011 things shifted into high gear. Enter the Stuxnet Worm. This was to become the world’s first weaponized attack. Stuxnet targeted Iran’s nuclear program, causing physical damage to their enrichment centrifuges. This was not the act of a lone hacker, prankster or script kiddie. This was the work of a Nation State.

Read More