About adlumin
This author has yet to write their bio.Meanwhile lets just say that we are proud adlumin contributed a whooping 15 entries.
Entries by adlumin
Responding to the Rise of Fileless Attacks
Kelly Sheridan Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise targets. Cybercriminals take the path of least resistance — which is why more of them are adopting fileless attacks to target their victims. The threat is poised to grow as attackers recognize the ease of […]
FBI Software For Analyzing Fingerprints Contains Russian-Made Code, Whistleblowers Say
FBI Software For Analyzing Fingerprints Contains Russian-Made Code, Whistleblowers Say In a secret deal, a French company purchased code from a Kremlin-connected firm, incorporated it into its own software, and hid its existence from the FBI, according to documents and two whistleblowers. The allegations raise concerns that Russian hackers could compromise law enforcement computer systems. […]
Tim Evans, Esq., LL.M. Speaks at NH-ISAC 2017 Conference
November 30, 2017 by adluminRob Johnston on MSNBC with Andrea Mitchell
Rob Johnston on MSNBC Watch Rob Johnston on MSNBC
CRACKING THE CODE: He Solved The DNC Hack
Stephen Voss for BuzzFeed News He Solved The DNC Hack. Now He’s Telling His Story For The First Time. Less than a year before Marine Corps cyberwarrior Robert Johnston discovered that the Russians had hacked the Democratic National Committee, he found they had launched a similar attack at the Joint Chiefs of Staff. Posted on November […]
Adlumin Sponsors APHSA ISM 2017 Technology Conference
Timothy Evans, J.D., LL.M., Co-Founder and Chief of Strategy Corporate breaches continue to succeed because attackers can steal the legitimate identities of your employees and use those identities to attack your infrastructure. Far deadlier than malware based attacks, identity based attacks can go undetected for months or years because perpetrators impersonate the methods used by […]
Robert Johnston, CEO, Speaks at EDGESECURITY 2017
Identity Based Attacks – Insights on the DNC Hack Why do corporate breaches continue to succeed? Corporate breaches continue to succeed because attackers are able to steal the legitimate identities of your employees and use those identities to attack your infrastructure. Far deadlier than malware based attacks, identity based attacks can go undetected for months […]
New N.S.A. Breach Linked to Popular Russian Antivirus Software
Published New York Times By SCOTT SHANE, DAVID E. SANGER and NICOLE PERLROTHOCT. 5, 2017 WASHINGTON — In the latest case of an insider removing sensitive data from the nation’s largest intelligence agency, Russian hackers obtained classified documents that a National Security Agency employee had taken and stored on his home computer. Investigators believe the hackers may have penetrated […]
Your Social Media Is the Weakest Link for Cyber Criminals
BY Tishin Donkersley @TishinD According to a recent survey by Norton, 94 percent of users on the internet think they can spot phishing emails. Unfortunately, they couldn’t be more wrong. The fact is that hackers are becoming savvier when it comes to finding personal information and tricking not only you, but your friends into providing more. Jere […]
1701 Rhode Island Ave. NW, 4th Floor
Washington, DC 20036
Headquarters: (202) 352-8001
Customer Support Only: (202) 400-3223
Google Maps: Get Directions