Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-09-02 21:00:00 UTC
Dark Reading
Dark Reading
New Jersey Man Sentenced to 7+ Years for Cyber Breaking & Entering

The man installed keyloggers, stealing credentials and information on emerging technology development.

2020-09-02 20:57:00 UTC
ThreatPost
ThreatPost
BEC Wire Transfers Average $80K Per Attack

That number represents a big uptick over Q1.

Hacks Most Recent ThreatLists Web Security Anti-Phishing Working Group APWG Average Transaction Amounts BEC Business Email Compromise Cosmic Lynx Gift Cards Phishing Q2 2020 The Report
2020-09-02 20:11:00 UTC
ThreatPost
ThreatPost
Triple-Threat Cryptocurrency RAT Mines, Steals and Harvests

KryptoCibule spreads via pirated software and game torrents.

Cryptography Malware Web Security Backdoor BitTorrent Cryptocurrency Cryptojacking Czech Republic Data Exfiltration ESET Ethereum KryptoCibule Malware Analysis Monero Pirated Games Pirated Software RAT Remote Access Trojan Slovakia Tor Wallet Theft
2020-09-02 19:00:00 UTC
HackRead
HackRead
New credit card skimmers channel funds through Telegram

By Sudais Asif

The technique focuses on using the famous messenger app Telegram for transmitting the stolen payment details.

This is a post from HackRead.com Read the original post: New credit card skimmers channel funds through Telegram

Security Cyber Crime Cyber Security Encryption Hacking Skimmer Telegram
2020-09-02 17:30:00 UTC
Dark Reading
Dark Reading
'KryptoCibule' Uses Several Tricks to Maximize Cryptocurrency Theft

The malware family uses multiple tactics to steal as much cryptocurrency as possible while flying under the radar.

2020-09-02 16:24:00 UTC
ThreatPost
ThreatPost
Joker Spyware Plagues More Google Play Apps

The six malicious apps have been removed from Google Play, but could still threaten 200,000 installs.

Malware Mobile Security Web Security Android App Android Malware App Removal Bread Convenient Scanner 2 Emoji Wallpaper Fingertip GameBox Google Google Play Joker Joker Malware Malware Push Message-Texting & SMS Safety AppLock Separate Doc Scanner Spyware
2020-09-02 15:30:00 UTC
Dark Reading
Dark Reading
5 Tips for Triaging Risk from Exposed Credentials

Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.

2020-09-02 14:21:00 UTC
HackRead
HackRead
28,000 exposed printers hacked to highlight lack of printer security

By Waqas

Researchers forced 28,000 printers worldwide to print out guidelines on printer security.

This is a post from HackRead.com Read the original post: 28,000 exposed printers hacked to highlight lack of printer security

Hacking News Cyber Security Hacking IoT Printer Vulnerability
2020-09-02 14:04:00 UTC
The Daily Swig
The Daily Swig
Facebook class action lawsuit could pave way for biometric privacy laws across the US

Aftermath of $650 million settlement could result in more targeted legislation

2020-09-02 14:03:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Phishing scam uses Sharepoint and One Note to go after passwords

Not all phishing links appear right in the email itself...

Phishing BEC One Note Phishing

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
20 May 2024
BREACHAWARE HQ

A total of 25 breaches were found and analysed resulting in 61,491,599 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included The Post Millennial, Share This, Book 24, Stealer Log 0457 and Stealer Log 0459