Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-07-02 01:10:00 UTC
Krebs on Security
Krebs on Security
Ransomware Gangs Don’t Need PR Help

We've seen an ugly trend recently of tech news stories and cybersecurity firms trumpeting claims of ransomware attacks on companies large and small, apparently based on little more than the say-so of the ransomware gangs themselves. Such coverage is potentially quite harmful and plays deftly into the hands of organized crime.

Often the rationale behind couching these events as newsworthy is that the attacks involve publicly traded companies or recognizable brands, and that investors and the public have a right to know. But absent any additional information from the victim company or their partners who may be affected by the attack, these kinds of stories and blog posts look a great deal like ambulance chasing and sensationalism.

Ransomware Ransomware
2020-07-02 00:49:00 UTC
HackRead
HackRead
New EvilQuest ransomware hits Mac devices through pirated software

By Zara Khan

EvilQuest ransomware also impersonates Google Software Update Program...

This is a post from HackRead.com Read the original post: New EvilQuest ransomware hits Mac devices through pirated software

Malware Security Fraud Hacking Mac MacOS Piracy Ransomware Scam
2020-07-01 22:50:00 UTC
Dark Reading
Dark Reading
Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign

Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.

2020-07-01 22:20:00 UTC
Dark Reading
Dark Reading
Chinese Software Company Aisino Uninstalls GoldenSpy Malware

Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.

2020-07-01 21:35:00 UTC
Dark Reading
Dark Reading
DHS Shares Data on Top Cyberthreats to Federal Agencies

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.

2020-07-01 21:35:00 UTC
Dark Reading
Dark Reading
DHS Shares Data on Top Cyber Threats to Federal Agencies

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.

2020-07-01 21:02:00 UTC
ThreatPost
ThreatPost
Cisco Warns of High-Severity Bug in Small Business Switch Lineup

A high-severity flaw allows remote, unauthenticated attackers to potentially gain administrative privileges for Cisco small business switches.

Vulnerabilities Web Security Cisco Cisco Flaw Cisco Patch CVE-2020-3297 High Severity Flaw Security Vulnerability Small Business Switch
2020-07-01 20:42:00 UTC
ThreatPost
ThreatPost
Alina Point-of-Sale Malware Spotted in Ongoing Campaign

The malware is using DNS tunneling to exfiltrate payment-card data.

Malware Akamai Alina Analysis Black Lotus Credit Card Data Malware Ongoing Campaign Payment Card Data Point Of Sale
2020-07-01 20:30:00 UTC
Dark Reading
Dark Reading
New MacOS Ransomware Hides in Pirated Program

A bogus installer for Little Snitch carries a ransomware hitchhiker.

2020-07-01 20:06:00 UTC
HackRead
HackRead
China’s insidious surveillance against Uyghurs with Android malware

By Sudais Asif

China for long has been persecuting Uyghurs Muslims on the pretext of countering extremist ideologies...

This is a post from HackRead.com Read the original post: China’s insidious surveillance against Uyghurs with Android malware

Surveillance China Hacking Islam Malware Muslim Spying Spyware Uyghurs

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
March 2024
By SUE DENIM
TikTok Ban, Discord Bot Community Attack, and Telecom Company's Breach Resurgence.
Ah, the dramatic saga of TikTok in the United States! Picture this: a ban looming over TikTok, akin to a dark cloud threatening to rain on our digital parade. Congress is all up in arms, waving their "think of the children" banners while TikTok nervously checks its watch, wondering if it should start packing its bags for a forced sale. Meanwhile, nobody bats an eye at the plethora of Chinese gadge...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
15 April 2024
BREACHAWARE HQ

A total of 15 breaches were found and analysed resulting in 10,110,194 leaked accounts containing a total of 23 different data types. The breaches found publicly and freely available included US Environmental Protection Agency (EPA), Stealer Log 0448, Stealer Log 0449, Believe and Carding Team