Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSThe photo-sharing app retained people’s photos and private direct messages on its servers even after users removed them.
By Sudais Asif
It is still unclear who owned the misconfigured Amazon S3 bucket.
This is a post from HackRead.com Read the original post: 350 million email addresses exposed on misconfigured AWS S3 bucket
Scheme developed to steer young people away from computer-enabled crime
Attackers look to drain their victims’ cloud computing resources – and their bank accounts
A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.
Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.
By Zara Khan
Somehow, the misconfigured Elasticsearch cluster did not contain medical data of patients.
This is a post from HackRead.com Read the original post: Medical software firm leakes personal data of 3.1 million patients
Breach disclosures are down, and reported ransomware attacks have also plummeted. Good news -- or a calm before the storm?
Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.
The APT is becoming more sophisticated over time.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESWeekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451