Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-07-24 16:32:00 UTC
ThreatPost
ThreatPost
NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug

Power plants, factories, oil and gas refineries and more are all in the sights of foreign adversaries, the U.S. warns.

Critical Infrastructure Government Hacks Vulnerabilities Advisory Alert CISA Critical Security Vulnerability CVE-2020-7491 Cyberattacks Factories Foreign Adversaries ICS-CERT Industrial Control Systems NSA Oil And Gas Refineries Power Plants Schneider Triconex Warning
2020-07-24 16:28:00 UTC
ThreatPost
ThreatPost
News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags

Threatpost editors talk about the biggest security news stories for the week ended Jul. 24.

Black Hat Bug Bounty Hacks Podcasts Privacy Apple Black Hat 2019 Black Hat 2020 Bug Bounty Cisco Google Google Project Zero Iphone Security Device Research Program Twitter Twitter Hack Webex Zoom
2020-07-24 16:15:00 UTC
HackRead
HackRead
Ransomware attack on fitness devices maker Garmin cripples operation

By Waqas

Garmin ransomware attack not only disrupted its operation but...

This is a post from HackRead.com Read the original post: Ransomware attack on fitness devices maker Garmin cripples operation

Cyber Attacks Security Cyber Attack Garmin Hacking Malware Ransomware
2020-07-24 15:05:00 UTC
The Daily Swig
The Daily Swig
Bug bounty leader Clément Domingo on cybersecurity in Africa, hacking events, and chaining vulnerabilities for maximum impact

The security researcher says it’s ‘our duty’ to sound the alarm over vulnerabilities – but getting organizations to listen can be a different ball game Critical infrastructure in Africa represents an

2020-07-24 14:53:00 UTC
Naked Security | Sophos
Naked Security | Sophos
ASUS routers could be reflashed with malware – patch now!

Responsible disclosure means the bugs are already fixed - but don't forget to check that you applied the patch.

IoT Vulnerability Asus Iot Router Vulnerability XSS
2020-07-24 14:25:00 UTC
Dark Reading
Dark Reading
Email Security Features Fail to Prevent Phishable 'From' Addresses

The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.

2020-07-24 14:00:00 UTC
Dark Reading
Dark Reading
Banning TikTok Won't Solve Our Privacy Problems

Preventing the use of an apps based solely on its country of origin (no matter how hostile) is merely a Band-Aid that won't fully address all privacy and security concerns.

2020-07-24 12:54:00 UTC
ThreatPost
ThreatPost
Malicious ‘Blur’ Photo App Campaign Discovered on Google Play

Twenty-nine bad mobile apps with a combined 3.5 million downloads bombard users with out-of-context ads.

Malware Mobile Security Android Bad Apps Chartreuseblur Developers Google Google Play Malware Mobile Apps Mobile Security Out Of Context Ads Photo Apps Satori Threat Intelligence And Research Team Square Photo Blur
2020-07-24 12:53:00 UTC
The Daily Swig
The Daily Swig
Spanish state railway company Adif hit by REvil ransomware attack

Attackers threaten to release personal data

2020-07-24 11:02:00 UTC
The Daily Swig
The Daily Swig
Coronavirus and cybercrime: Germany assumes EU presidency with strong focus on cybersecurity

Data privacy, IoT security, and closer co-operation among member states also on the agenda

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
13 May 2024
BREACHAWARE HQ

A total of 35 breaches were found and analysed resulting in 4,063,408 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included ESN, Stealer Log 0456, SVR Labs, Kuchenland and Stealer Log 0455