Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2024-05-03 23:13:00 UTC
HackRead
HackRead
New Goldoon Botnet Targeting D-Link Devices by Exploiting Weak Credentials

By Waqas

A new botnet called Goldoon targets D-Link routers and NAS devices putting them at risk of DDoS attacks and more. Learn how weak credentials leave you vulnerable and how to secure your network. pen_spark

This is a post from HackRead.com Read the original post: New Goldoon Botnet Targeting D-Link Devices by Exploiting Weak Credentials

Security Malware Botnet Brute Force D-Link DDOS Fortinet Goldoon NAS Router
2024-05-02 13:01:00 UTC
HackRead
HackRead
LayerX Security Raises $24M for Browser Security: Empowering Secure Remote Work

By Cyber Newswire

Early adoption by Fortune 100 companies worldwide, LayerX already secures more users than any other browser security solution and enables unmatched security, performance and experience  

This is a post from HackRead.com Read the original post: LayerX Security Raises $24M for Browser Security: Empowering Secure Remote Work

Press Release Browser LayerX Security
2024-05-02 13:01:00 UTC
HackRead
HackRead
LayerX Security Raises $24M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere

By cybernewswire

Tel Aviv, Israel, May 2nd, 2024, CyberNewsWire Early adoption by Fortune 100 companies worldwide, LayerX already secures more…

This is a post from HackRead.com Read the original post: LayerX Security Raises $24M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere

News
2024-05-01 17:16:00 UTC
HackRead
HackRead
Muddling Meerkat Group Suspected of Espionage via Great Firewall of China

By Deeba Ahmed

Uncover the "Muddling Meerkat," a China-linked threat actor manipulating the DNS. Infoblox research reveals a sophisticated group with deep DNS expertise and potential ties to the Great Firewall. Learn their tactics and how to stay protected.

This is a post from HackRead.com Read the original post: Muddling Meerkat Group Suspected of Espionage via Great Firewall of China

Cyber Attacks Security Censorship China Cyber Attack Cybersecurity Firewall Great Firewall Muddling Meerkat
2024-04-30 16:28:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Sophos named a Leader in the 2024 IDC MarketScape for Worldwide Managed Detection and Response (MDR)

The IDC MarketScape evaluates the capabilities and business strategies of managed detection and response service providers worldwide.

Products & Services Featured IDC MDR Security Operations
2024-04-30 13:34:00 UTC
Krebs on Security
Krebs on Security
Man Who Mass-Extorted Psychotherapy Patients Gets Six Years

A 26-year-old Finnish man was sentenced to more than six years in prison today after being convicted of hacking into an online psychotherapy clinic, leaking tens of thousands of patient therapy records, and attempting to extort the clinic and patients.

Ne'er-Do-Well News Antii Kurittu ColdFusion Botnet Hack The Planet Julius Zeekill Kivimaki Lizard Squad Ransom_man Vastaamo Psychotherapy Center Ville Tapio
2024-04-30 10:30:00 UTC
Naked Security | Sophos
Naked Security | Sophos
The State of Ransomware 2024

Our fifth annual report reveals how ransomware experiences have changed over the last year, plus brand-new insights into the business impact of an attack.

Products & Services Backups Endpoint Featured Ransomware Research Security Operations Vulnerabilities
2024-04-29 20:56:00 UTC
Krebs on Security
Krebs on Security
FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data

The U.S. Federal Communications Commission (FCC) today levied fines totaling nearly $200 million against the four major carriers -- including AT&T, Sprint, T-Mobile and Verizon -- for illegally sharing access to customers' location information without consent.

Ne'er-Do-Well News AT&T LocationSmart Securus Technologies Sprint T-Mobile U.S. Federal Communications Commission Verizon
2024-04-29 11:04:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Sophos Endpoint: Adaptive Attack Protection Gets Even Better

Sophos continues to deliver the strongest endpoint protection in the industry.

Products & Services Endpoint Intercept X Sophos Endpoint
2024-04-29 10:25:00 UTC
HackRead
HackRead
Fake Chrome Updates Hide Android Brokewell Malware Targeting Your Bank

By Deeba Ahmed

New Android malware alert! Brokewell steals data, takes over devices & targets your bank. Learn how this sneaky malware works & what you can do to protect yourself. Stop Brokewell before it stops you!

This is a post from HackRead.com Read the original post: Fake Chrome Updates Hide Android Brokewell Malware Targeting Your Bank

Security Malware Android Backdoor Banking Brokewell Chrome Scam

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451