Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSCybercriminals are exploiting Covid-19 concerns as situation worsens
The Pakistani-linked APT has been spotted infecting victims with data exfiltration malware.
Only half of respondents to a recent Dark Reading study felt confident that their third-party business partners would, at least, tell them if a compromise occurred.
Virtual simulators part of toolkit that Mailis Pukonen wants 144,000 law enforcement officials to harness
Legislation should protect the good hackers who are helping to keep us safe, not just go after the bad.
HHS puts extra cyber protections in place amid coronavirus pandemic
Slack has fixed a bug that allowed attackers to hijack user accounts by tampering with their HTTP sessions.
The tendency by many attackers to wait for the right time to strike gives defenders an opening, FireEye says.
The tendency by many attackers to wait for the right time to strike gives defenders an opening, FireEye says.
Rise and fall of a Nigerian cybercriminal called ‘Dton,’ who made hundreds of thousands of dollars in a 7-year campaign, outlined in new report.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESWeekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 25 breaches were found and analysed resulting in 61,491,599 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included The Post Millennial, Share This, Book 24, Stealer Log 0457 and Stealer Log 0459