Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-07-17 14:30:00 UTC
The Daily Swig
The Daily Swig
LibreHealth medical records app exposes sensitive patient data

Project maintainers are still working on a fix

2020-07-17 12:56:00 UTC
The Daily Swig
The Daily Swig
The Pwning Machine – a new bug bounty testing environment from YesWeHack

Docker-based suite includes a DNS server, HTTP router, web server, and pipeline runner

2020-07-17 11:22:00 UTC
The Daily Swig
The Daily Swig
Unpatched Tenda WiFi router vulnerabilities leave home networks wide open to abuse

More than six months have passed, and the Chinese hardware vendor still hasn’t responded to researchers

2020-07-16 22:50:00 UTC
Dark Reading
Dark Reading
8 Signs of a Smartphone Hack

A rapidly dwindling battery life or sudden spike in data usage could indicate your iOS or Android device has been compromised.

2020-07-16 21:41:00 UTC
Krebs on Security
Krebs on Security
Who’s Behind Wednesday’s Epic Twitter Hack?

Twitter was thrown into chaos on Wednesday after accounts for some of the world's most recognizable public figures, executives and celebrities starting tweeting out links to bitcoin scams. Twitter says the attack happened because someone tricked or coerced an employee into providing access to internal Twitter administrative tools. This post is an attempt to lay out some of the timeline of this attack, and point to clues about who may have been behind it.

A Little Sunshine Ne'er-Do-Well News @6 @B Chaewon Chuckling Squad Joseph James Connor OG PlugWalkJoe Shinji
2020-07-16 21:15:00 UTC
Dark Reading
Dark Reading
Major Flaws Open the Edge to Attack

Attackers are using critical exploits for flaws in VPN appliances, app-delivery services, and other network-edge hardware and software to punch through corporate perimeters. What can companies do?

2020-07-16 20:25:00 UTC
ThreatPost
ThreatPost
Enterprise Data Security: It’s Time to Flip the Established Approach

Companies should forget about auditing where data resides and who has access to it.

Breach Cloud Security Hacks InfoSec Insider Mobile Security Web Security Code42 Collaboration Data Audit Data Classification Enterprise Data Security Infosec Insider Preventing Data Breaches Remote Working Rob Juncker Traditional Approaches
2020-07-16 19:29:00 UTC
HackRead
HackRead
Online Jewish service ‘Zoom bombed’ with hate speech & Swastikas

By Zara Khan

A hateful intrusion during a Jewish congregation service on Zoom has...

This is a post from HackRead.com Read the original post: Online Jewish service ‘Zoom bombed’ with hate speech & Swastikas

Cyber Crime Hacking Racism Vulnerability Zoom
2020-07-16 18:31:00 UTC
Dark Reading
Dark Reading
Twitter Attack Raises Concerns Over its Internal Controls

Attackers temporarily gained control of the accounts of Joe Biden, Barack Obama, Bill Gates, and others, to tweet a bitcoin scam.

2020-07-16 18:05:00 UTC
ThreatPost
ThreatPost
Hackers Look to Steal COVID-19 Vaccine Research

The Russia-linked APT29 has set its sights on pharma research in Western nations in a likely attempt to get ahead on a cure for coronavirus.

Breach Government Hacks Vulnerabilities APT29 Canada Coronavirus COVID-19 Cure Cyberattack DHS Espionage Joint Advisory Nation State Ncsc Pharma R&d Russian Hackers State Sponsored Therapeutics Threat Action U.k. U.S. Vaccine Research

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
06 May 2024
BREACHAWARE HQ

A total of 19 breaches were found and analysed resulting in 6,573,110 leaked accounts containing a total of 22 different data types. The breaches found publicly and freely available included Rendez-Vous, Stealer Log 0454, boAt Lifestyle, Expandia and Intergroup Gold