EZProtect Archives - Adaptus

Based on recent activity in the middle-east, MSSP Alert reports on insights from the Cybersecurity and Infrastructure Security Agency (CISA) about potential Iranian attacks on the United States and related infrastructure.

Read More

It's been nagging at you for years, but now is the time to act as the cost of doing nothing will not only cost you your job, but the company millions.

Read More

Voters must have confidence that the voting was fair, regardless of how much money is spent or what security controls are put in place. That makes securing election infrastructure categorically different than almost any other information security challenge today.

Read More

Traditional phishing attacks that most people are familiar with consist of fake login pages hosted on attacker-controlled web servers and served from custom domains whose names are similar to those of the targeted websites. However, such static attacks are not effective against online services that use two-factor authentication, because there is no interaction with the legitimate websites to trigger the generation of one-time-use codes.

Read More

With the addition of the EZProtect (ODS) API, any cloud-based or on-premises application with an API (such as Box.com, Sharefile, Office 365 OneDrive, Mulesoft, Boomi, etc.) may also connect to EZProtect enabling enterprise-wide virus scanning of files with centralized reporting.

Read More

In 2011 things shifted into high gear. Enter the Stuxnet Worm. This was to become the world’s first weaponized attack. Stuxnet targeted Iran’s nuclear program, causing physical damage to their enrichment centrifuges. This was not the act of a lone hacker, prankster or script kiddie. This was the work of a Nation State.

Read More

Shopping carts are attractive targets because they collect payment information from customers: if your malware can tap into this data stream, you have a ready-made card collection tool.

Read More

As a company that suffered a data beach, UK newspaper Racing Post underwent its own rethink around security strategy, while also navigating three acquisitions that could potentially have been problematic if approached in the wrong way.

Read More

If you don’t collect it, no one can steal it. I’m guessing some of the people in this 200 million-record breach would agree. Sometimes the best way to secure customer data is not to collect it in the first place. While it can be tempting to “collect it all” just in case, most enterprises need […]

Read More

Researchers have found new flaws in Intel processors that could allow hackers to defeat the security boundaries enforced by virtual machine hypervisors, operating system kernels and Intel SGX enclaves, putting data on both servers and endpoint systems at risk. The new attack techniques can be used to leak sensitive secrets like passwords or encryption keys […]

Read More