Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-05-15 16:00:00 UTC
Dark Reading
Dark Reading
The Entertainment Biz Is Changing, but the Cybersecurity Script Is One We've Read Before

Several A-list celebrities have found themselves at the center of a ransomware attack -- and it's certainly not the first time hackers have gone after them or the entertainment industry. What are security pros doing wrong?

2020-05-15 15:59:00 UTC
ThreatPost
ThreatPost
RATicate Group Hits Industrial Firms With Revolving Payloads

A new threat group uses NSIS as an installer to target industrial companies with revolving payloads, including LokiBot, FormBook, BetaBot, Agent Tesla and Netwire.

Hacks Malware Agent Tesla BetaBot FormBook LokiBot Malware Malware Campaign Netwire NSIS NSIS File NSIS Installer Payload RATicate Sophos
2020-05-15 15:54:00 UTC
ThreatPost
ThreatPost
Quantum Security Goes Live with Samsung Galaxy

Quantum encryption, which has been touted as "unhackable," debuts with Samsung, SK Telecom in a world's first.

Cryptography Mobile Security Cryptographer’s Panel How It Works Mobile Phone Photons Quantum Cryptography Quantum Encryption Random Number Generation Rng Chipset RSA Conference Samsung Samsung Galaxy A Quantum Sk Telecom South Korea Unhackable
2020-05-15 15:22:00 UTC
The Daily Swig
The Daily Swig
US healthcare admin firm admits data breach

More than 30,000 patients warned of potential PPI exposure Email account breaches at Management and Network Services (MNS) may have exposed the “personal and protected health information” of patients,

2020-05-15 14:00:00 UTC
Dark Reading
Dark Reading
4 Challenges with Existing VPNs

A VPN is a step in the right direction, but it's not the be-all and end-all when it comes to security and falls short in many ways.

2020-05-15 13:50:00 UTC
Naked Security | Sophos
Naked Security | Sophos
S2 Ep 39: Thunderspy, government encryption, and reply all mistakes – Naked Security Podcast

In this episode Mark discusses government encryption, Duck tells us why turning your computer off is a cool idea and Greg regales us with his reply all woes. Host Anna Brading is joined by Sophos experts Mark Stockley, Paul Ducklin, Greg Iddon and Producer Alice Duckett. Listen now! LISTEN NOW Click-and-drag on the soundwaves below […]

Podcast Naked Security Podcast
2020-05-15 13:37:00 UTC
HackRead
HackRead
8 best dark web search engines for 2020

By Sudais Asif

For a beginner, it is almost impossible to find a website on the Tor browser, and that's where dark web search engines help.

This is a post from HackRead.com Read the original post: 8 best dark web search engines for 2020

Technology News Dark Web Google Privacy Search Engine Security Tor VPN
2020-05-15 13:32:00 UTC
The Daily Swig
The Daily Swig
HackerOne co-founder unearths information leakage bug in Rails package

Security flaw allowed attackers to snoop on payment info and gather private bug bounty program details

2020-05-15 13:17:00 UTC
ThreatPost
ThreatPost
Paying Ransomware Crooks Doubles Clean-up Costs, Report

Paying ransom to cybercriminals costs companies hit with ransomware attacks more than recovering data on their own, according to a new research.

Cryptography Malware Cyber-attacks Cybercriminals Data Recovery Private Sector Public Sector Ransom Ransomware Reports Research Sophos
2020-05-15 13:04:00 UTC
Naked Security | Sophos
Naked Security | Sophos
How scammers abuse Google Search’s open redirect feature

Google Search uses open redirects by design, which is handy if you're a scammer trying to hide an iffy-looking URL.

Google

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
February 2024
By SUE DENIM
The Truth Behind "The Xun" Repository Bombshell.
Well, well, well, it seems the digital waters are getting murkier by the day. A mysterious GitHub user by the name of I-SOON recently made their grand entrance onto the coding scene, dropping a repository bombshell titled "The Truth Behind an Xun." Inside? Oh, just a casual 200 megabytes of top-secret intel about a Chinese cybersecurity company. Talk about spilling the digital tea!

This treasur...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
25 March 2024
BREACHAWARE HQ

A total of 24 breaches were found and analysed resulting in 87,916,303 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included AT&T Division, US Consumer Opt In Records, Gosuslugi [2], Kava CasinoLife Poker and Stealer Log 0438