Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-07-23 11:30:00 UTC
Dark Reading
Dark Reading
8 Cybersecurity Themes to Expect at Black Hat USA 2020

Here are the trends and topics that'll capture the limelight at next month's virtual event.

2020-07-22 22:09:00 UTC
HackRead
HackRead
New ‘BadPower’ attack on fast chargers can burn your smartphone

By Zara Khan

BadPower was tested on 35 fast charging models out of 234 available in...

This is a post from HackRead.com Read the original post: New ‘BadPower’ attack on fast chargers can burn your smartphone

Security BadPower Security Smartphone Technology Vulnerbility
2020-07-22 21:14:00 UTC
ThreatPost
ThreatPost
OilRig APT Drills into Malware Innovation with Unique Backdoor

The RDAT tool uses email as a C2 channel, with attachments that hide data and commands inside images.

Malware Apt Apt34 Backdoor C2 Channel Email Helix Kitten Irán OilRig Palo Alto Rdat Steganography Unit 42
2020-07-22 21:08:00 UTC
ThreatPost
ThreatPost
Apple Security Research Device Program Draws Mixed Reactions

Apple's Security Research Device program is now open to select researchers - but some are irked by the program's vulnerability disclosure restrictions.

Bug Bounty Mobile Security Apple Apple Bug Bounty Apple Developer Program Bug Bounty Ios Iphone Mac MacOS Security Research Device Program Vulnerability
2020-07-22 20:25:00 UTC
Krebs on Security
Krebs on Security
Twitter Hacking for Profit and the LoLs

The New York Times last week ran an interview with several young men who claimed to have had direct contact with those involved in last week's epic hack against Twitter. These individuals said they were only customers of the person who had access to Twitter's internal employee tools, and were not responsible for the actual intrusion or bitcoin scams that took place that day. But new information suggests that at least two of them operated a service that resold access to Twitter employees for the purposes of modifying or seizing control of prized Twitter profiles.

A Little Sunshine Ne'er-Do-Well News Allison Nixon Aqua Beyond Insane Chaewon Crim Ever So Anxious Joseph O'Connor Josh Perry Lol Mark Rasch Mason Ogusers PlugWalkJoe Promo Samy Tarazi SIM Swapping Tankska Unit 221B Voku
2020-07-22 20:20:00 UTC
Dark Reading
Dark Reading
CISA Hires Security Experts to Boost COVID-19 Response

The agency brings in expertise from the private sector to improve its technical capabilities and engagement with industry partners.

2020-07-22 19:55:00 UTC
Dark Reading
Dark Reading
North Korea's Lazarus Group Developing Cross-Platform Malware Framework

The APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS, and Linux.

2020-07-22 18:45:00 UTC
Dark Reading
Dark Reading
COVID-19-Related Attacks Exploded in the First Half of 2020

COVID-19 as part of a cyberattack increased by more than 3,900% between February and June.

2020-07-22 18:19:00 UTC
HackRead
HackRead
UFO VPN leaks database again; gets taken over & destroyed by hackers

By Sudais Asif

UFO VPN was caught saving and leaking user logs despite complaining strictly no-log policy. Here's what happened now.

This is a post from HackRead.com Read the original post: UFO VPN leaks database again; gets taken over & destroyed by hackers

Leaks Security Breach ElasticSearch Encryption MongoDB Privacy UFO VPN VPN
2020-07-22 18:00:00 UTC
Dark Reading
Dark Reading
The InfoSec Barrier to AI

Information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
13 May 2024
BREACHAWARE HQ

A total of 35 breaches were found and analysed resulting in 4,063,408 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included ESN, Stealer Log 0456, SVR Labs, Kuchenland and Stealer Log 0455