Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-09-01 20:19:00 UTC
ThreatPost
ThreatPost
Magento Sites Vulnerable to RCE Stemming From Magmi Plugin Flaws

Two flaws - one of them yet to be fixed - are afflicting a third-party plugin used by Magento e-commerce websites.

Vulnerabilities Web Security Cross Site Forgery Attack CVE-2020-5776 CVE-2020-5777 Cyberattack Magento Magmi Plugin Poc Exploit Proof Of Concept Remote Code Execution Third Party Plugin
2020-09-01 19:45:00 UTC
Dark Reading
Dark Reading
Apple Signs Shlayer, Legitimizes Malware

Shlayer, a common macOS Trojan, received Apple's notary certification and place in the App Store -- twice.

2020-09-01 18:40:00 UTC
Dark Reading
Dark Reading
New APT Pioneer Kitten Linked to Iranian Government

The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.

2020-09-01 18:00:00 UTC
Dark Reading
Dark Reading
ISO 27701 Paves the Way for a Strategic Approach to Privacy

As the first certifiable international privacy management standard, ISO 27701 is a welcome addition to the existing set of common security frameworks.

2020-09-01 17:38:00 UTC
HackRead
HackRead
Apple mistakenly approved malware camouflaged as Adobe Flash Player

By Deeba Ahmed

Apple approved nasty Shlayer malware that mimicked Adobe Flash Player update on macOS.

This is a post from HackRead.com Read the original post: Apple mistakenly approved malware camouflaged as Adobe Flash Player

Apple News Malware Security Apple Cyber Security MacOS Security Shlayer
2020-09-01 16:37:00 UTC
ThreatPost
ThreatPost
U.S. Voter Databases Offered for Free on Dark Web, Report

Some underground forum users said they're monetizing the information through the State Department's anti-influence-campaign effort.

Breach Cloud Security Government Privacy Vulnerabilities Web Security Connecticut Influence Campaigns Kommersant Michigan Phishing Rewards For Justice Program Russia Sql Injection State Department Stolen Underground Forum United States Voter Databases
2020-09-01 16:30:00 UTC
The Daily Swig
The Daily Swig
Bug Bounty Radar // The latest bug bounty programs for August 2020

New web targets for the discerning hacker

2020-09-01 16:23:00 UTC
ThreatPost
ThreatPost
Magecart Credit-Card Skimmer Adds Telegram as C2 Channel

In a rare move, the encrypted messaging service is being used to send stolen payment-card data from websites back to cybercriminals.

Malware Vulnerabilities Web Security Affablekraut C2 Channel Command And Control Cyberattack Magecart Malwarebytes Payment Card Data Stolen Credit Card Data Telegram Web Skimmer Website Security
2020-09-01 15:10:00 UTC
ThreatPost
ThreatPost
FBI: Ring Smart Doorbells Could Sabotage Cops

While privacy advocates have warned against Ring's partnerships with police, newly unearthed documents reveal FBI concerns about 'new challenges' smart doorbell footage could create for cops.

Government IoT Privacy Web Security Amazon BlueLeaks Cop Privacy FBI IoT Security Law Enforcement Leaked Document Ring Smart Doorbell Smart Home Surveillance
2020-09-01 14:00:00 UTC
The Daily Swig
The Daily Swig
Flaw allowed adware slingers to slip past Apple’s approval protocol

Questions raised about Apple’s screening process

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
13 May 2024
BREACHAWARE HQ

A total of 35 breaches were found and analysed resulting in 4,063,408 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included ESN, Stealer Log 0456, SVR Labs, Kuchenland and Stealer Log 0455