Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSTechnique could be used to bypass authentication and compromise critical internal applications
The first phase of Apple and Google's contact tracing framework allows public health authorities across the world to connect their apps with data that could help them identify people at risk from coronavirus.
WebRTC DNS lookups exploited in clever hack
Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we've known about it for so long?
Some 8 million of the meal delivery company's customer records have been offered for sale on the Dark Web.
Looking for niche anomalies in an automated way with AI and machine learning is the future.
By Waqas
The stolen Indonesian citizenship and electoral data is currently available for free download on a hacker forum.
This is a post from HackRead.com Read the original post: Hacker leaks 2.3 million Indonesian citizenship data for free download
By Waqas
The stolen Indonesian citizenship and electoral data is currently available for free download on a hacker forum.
This is a post from HackRead.com Read the original post: Hacker leaks 2.3 million Indonesian citizenship data for download
By Deeba Ahmed
The trend of targeting companies with ransomware then leaking on the dark web is increasing. In the latest, Toll group is the victim.
This is a post from HackRead.com Read the original post: Dark Web hackers publish 200GB of Toll Group’s stolen corporate data
Cisco has fixed a critical remote code-execution flaw in its popular customer interaction management solution.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESWeekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 35 breaches were found and analysed resulting in 4,063,408 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included ESN, Stealer Log 0456, SVR Labs, Kuchenland and Stealer Log 0455