Thursday, September 19, 2019
Home The Daily Breach

The Daily Breach

ESET Researchers Discover First UEFI Rootkit Used In Cyberattack

The research team based in Montreal, discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers, the first-ever in-the-wild. Dubbed LoJax by ESET, this rootkit was part...
video

Sophos Introduces Lateral Movement Protection to XG Firewall

Sophos, a global leader in network and endpoint security, announced that its next-generation Sophos XG Firewall now includes lateral movement protection to prevent targeted, manual cyberattacks or exploits from infiltrating further...

Ethical hacker gets stumped by Barrier 1 technology

Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities they do it to help organizations better...

Biostar security software (developed by Suprema), leaked fingerprints and other data on millions of...

Are you really that surprised that biometric data has been leaked? Yet another example of how all of the data that companies are so busy gathering on people do not outweigh the...

Could The Hacking Of 50 Million Facebook Users Been Prevented?

I reached out to one of our contributors (Jim Libersky) to our news column “Daily Breech” to get his thoughts on the recent Facebook Cyber Hack that now touches 50 Million...

Marriott Hotels Hacked! Data of 500 Million Guests May Be Compromised

Still among the numerous Google searches today on this massive security breach story, I saw the Marriott Ad running “We’re Reinventing Travel with Innovation and Sophisticated Design. Reserve Now. Mobile Check...
video

Veriato Offers Employee Monitoring and Insider Threat Detection

Veriato is an endpoint monitoring solution offering MSPs another revenue avenue for cybersecurity, without having a team of professionals on staff.  Their built-in API solution helps increase productivity of employees, by...

RDP Cyber Attacks In The Rise?

Cyber Attacks using RDP (Remote Desktop Protocol) are not new but they are on the rise. When you review why and what RDP was first developed for and then how it...
video

Asigra Partners Choosing Preventative Over Reactive Strategies for Ransomware Defense

Asigra Inc., a leading cloud backup, recovery and restore software provider since 1986, today highlighted rapid adoption of the company’s Asigra Cloud Backup™ V14 software as partners recognize the advantages of...