Our Blog

Stay updated with all the latest news and announcements

pic43

From Caesar to Honeypots

A Brief History of Cryptography

90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have been working overtime to engineer increasingly complex encryption techniques.         

read more...

pic42

The Cybersecurity Mindset

Top Four Security Myths

Myth 1: Everyone is accountable for cybersecurity.        
We often hear things like "Everyone is accountable for security." This is false. While everyone is responsible for cyber security, only a select few are ultimately accountable.

read more...

pic40

Are our governments prepared?

The Politics of Cybersecurity

The State of Mississippi completed its first governmentwide cybersecurity audit this month. The results were less than encouraging.
                                        

read more...

pic39

Can they work together?

Cybersecurity and Healthcare

In the wave of large-scale cybersecurity breaches sweeping the country, there is one sector which is barely reported on, and yet represents possibly the most pressing technological threat to human life.
                    
...

read more...

pic38

The California Consumer Protection Act

A Brief Guide to CCPA

The California Consumer Protection Act (CCPA) is designed to enhance data privacy rights and consumer protections for the citizens of California and comes into effect on January 1, 2020. Although it's been over 2 years since the bill has been ratified, many companies are still not sure if and how they will be affected.  

read more...

pic37

3 Takeaways from the Ecuador Breach

Julian Assange Gets a Taste of His Own Medicine

Earlier this week, residents of Ecuador woke up to the news that much of their personal data, including banking details, employment information, and identification numbers, had been made publicly available by a small online consulting firm.
       

read more...

pic36

What Facebook keeps getting wrong

The Culture of Cybersecurity

Yet another 419 million Facebook accounts have been breached. Add this to the 100s of millions already compromised in the Cambridge Analytica, UpGuard, and 'View As' scandals, and the question becomes: can Facebook ever be secure?            

read more...

pic35

Continuous Monitoring

The Latest in Cybersecurity Trends

Here's a fact: On average, it takes companies nearly half a year to identify a cyber security breach. 
Here's another fact: Research shows that breaches that take over 30 days to contain cost an average of $1 million more than those contained within the first month.
...

read more...

pic34

Lessons from Black Hat 2019 and Def Con 27

The Myth of Cyber Security

Riddle: What do Marriott, Equifax, and Capital One all have in common?
Answer: They've each been the victim of a data breach compromising 100 million+ users each; all in the past 12 months.                 

read more...

pic32

5 Important Steps to Help Your Business Respond Quickly and Safely

You've Been Hacked. Now What?

Unfortunately, successful cyberattacks are growing far too common. A 2018 study found that nearly 70% of SMBs have experienced a cyberattack in the past year, yet an astounding 47% of respondents said they "have no understanding" of how to protect themselves ...

read more...

pic29

3 Takeaways from Tim Cook's Stanford Graduation Speech

Cybersecurity and the Fight for the Soul of Silicon Valley

In his now (in)famous speech, Tim Cook used the Stanford graduation ceremony last weekend to warn the young grads (and the world) about his concerns regarding the direction tech firms have been taking. While hailing the industry for its successes - from HP to the iPhone - Cook pulled no punches when discussing the chaos that they've created. Here are 3 takeaways from Cook's remarks:
 ...

read more...

pic28

How cybersecurity is changing the way we value financial assets

Silicon Valley meets Wall Street

With seemingly daily reports of massive data breaches, cybersecurity remains one of the highest risks facing firms and their clients. But none of this is news. Instead, in this article I'll be taking a close-up look at some of the quantifiable effects that security breaches have had on asset market values. Here's a roundup of some of the more infamous cases in recent news:
   ...

read more...

pic27

Where Y Combinator Went Wrong

Why its up to Incubators and Accelerators to Solve our Cybersecurity Woes

In 2016, a young sales intelligence firm, Apollo, emerged from Y Combinator against a backdrop of flashy PR and projected growth. Reveling in their nascent celebrity, Apollo went so far as to boast on their homepage that "no one ever drowned from revenue." But it was not revenue that they drowned in when, late last summer, Apollo's databases were hacked, releasing 212 million contact listings, con...

read more...

pic26

Cybersecurity for Web Design Agencies

3 Lessons Learned from Accenture's Mistakes

By now we've all heard the news. Car rental behemoth, Hertz, is suing Accenture for $32 million for their failure to deliver "viable web and mobile applications". In fact, Hertz claims that the project needed to be "scrapped" entirely due to "serious security vulnerabilities and performance p...

read more...

pic25

What to look out for

Most Common Startup Cybersecurity Myths

If you've ever been in a meeting at a startup when the topic of cybersecurity came up, then you've probably seen the barely concealed eye-rolls, feigned attention, and predictable inaction. The reason for this is often simple: startups just don't see themselves as viable targets and are already under immense financial strain. Far more focused on "lean" development, marketing and financials, startu...

read more...

pic21

Silent Breach article in Silicon Luxembourg

Silent Breach's mission to protect millions of devices

Marc Castejon is the CEO and Founder of Silent Breach, a cybersecurity startup that specializes in network security and digital asset protection. With over 20 years of experience in the US retail market, Marc and his team have recently developed a software product to help retailers proactively protect their businesses. (Image Credit: Marc Castejon, CEO and Founder of Silent Breach / Image Credit ...

read more...

pic20

Happy new year from us to you

8 cyber security resolutions for 2019

There is no doubt that 2018 has been a bad year for cyber security. With the massive Facebook breach resulting in the exposure of 50 million accounts, Quora's 100s of millions...

read more...

pic16

Top 5 tips from pentesters

Hardening your webapp security

The recent explosion of webapps has led to a dramatic rise in cyber attacks specifically targeting vulnerabilities in web applications. Three quarters of the web applications tested by Silent Breach presented high or critical vulnerabilities that could have led to a data breach, or even total compromise of the website: Fortunately, the ...

read more...

pic15

Silent Breach provides cyber security training

Cyber and Information Security Management for Kosovo Banking Association

Silent Breach training expert Hristiyan Lazarov representing the Luxembourg House of Training in Pristina, Kosovo gave a lecture on "Cyber and Information Security Management" to the Kosovo Banking Association. This 3 day training session gave the assosiation an overview of the most common cyber security tactics used in the finance industry today, as well as an insight into trends in the security ...

read more...

pic9

Are you ready for GDPR?

GDPR Compliance checklist

The European Parliament adopted The General Data Protection Regulation GDPR in April 2016, replacing an outdated data protection directive from 1995. It carries provisions that require businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU ...

read more...

pic8

Happy new year 2018!

8 cyber security resolutions for 2018

There is no doubt that 2017 has been a bad year for cyber security, with the Equifax breach, Wannacry ransomeware, Russian social media manipulation, etc... But to get you ready for 2018, here's our top 8 cyber-security recommendations to survive through this new year:

...

read more...

pic6

New vulnerability uncovered

Silent Breach finds vulnerability with Wikipedia.org

Silent Breach finds a vulnerability with the online Wikipedia web site and in its free open source MediaWiki platform:

This vulnerability allows an attacker to gather information on the target (Wikipedia.org) and more easily narrow down potential breaches in the modules used by this web site. This kind of vulnerability is commonly referred to as Information Exposure Through Sent Data ...

read more...

pic3

Spread the word

Referral fee $1,500

For a limited amount of time, https://silentbreach.com/ is offering a $1500 referral fee for any penetration test mission or source code review mission that leads to a contract. Offer ends 2/28/17, 3 day contract minimum, spread the word!
...

read more...