Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSRecent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.
Fresh walls erected against privacy-busting web threats
Microsoft and partners went after the botnet using a copyright infringement tactic and hunting down C2 servers.
By Sudais Asif
According to CISA, these Windows flaws are centered around Fortinet FortiOS Secure Socket Layer (SSL) VPN and MobileIron platform.
This is a post from HackRead.com Read the original post: Hackers exploit VPN, Windows flaws to influence US elections
Research details how cybercriminals are targeting retail giants’ customers
Bad actors are leveraging legitimate services and tools within Microsoft's productivity suite to launch cyberattacks on COVID-19 stay-at-home workers, new research finds.
Open source tool hunts for active Google IDs, YouTube channels, and other Google-owned services
The attack, which now includes extortion components, has moved into its second week.
The crooks haven't yet been caught and arrested, but their malware distribution network has been hit hard.
Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESWeekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451