Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-03-17 12:16:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Tor browser fixes bug that allows JavaScript to run when disabled

The Tor browser has a bug that could allow JavaScript to execute on websites even when users think they’ve disabled it for maximum anonymity.

Privacy Security Threats Vulnerability Web Browsers Anonymity Browser Privacy Firefox Java JavaScript NoScript The Onion Router Tor Tor Browser
2020-03-17 12:10:00 UTC
Naked Security | Sophos
Naked Security | Sophos
WordPress to get automatic updates for plugins and themes

Good news for website admins: the ability to automatically update plugins and themes is being beta-tested for WordPress 5.5, due in August.

Security Threats Vulnerability Wordpress Wordpress Plugins
2020-03-17 10:51:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Europol busts up two SIM-swapping hacking rings

What a nightmare: your phone goes dead, and you can't log into your bank account because it's controlled by a hacker who's draining you dry.

2-factor Authentication Law & Order Malware Security Threats 2FA Europol Operation Quinientos Dusim Operation Smart Cash SIM Hijackers SIM Hijacking SIM Jacking Sim Swap SIM Swap Fraud Sim Swapping SIM Swaps SIM-swapping Attacks Two-factor Authentication
2020-03-16 21:13:00 UTC
ThreatPost
ThreatPost
Convincing Google Impersonation Opens Door to MiTM, Phishing

Using homographic characters is an easy way to execute a convincing fake site.

Web Security Fake Site Google Homographic Characters Impersonation Tactics Man In The Middle MitM Phishing
2020-03-16 21:01:00 UTC
HackRead
HackRead
Google & Microsoft launch tools to address Coronavirus outbreak

By Deeba Ahmed

Google's Coronavirus tool is called COVID-19 risk screening and testing while Microsoft calls it Bing COVID Tracker.

This is a post from HackRead.com Read the original post: Google & Microsoft launch tools to address Coronavirus outbreak

Google News Microsoft Technology News Coronavirus Google Technology
2020-03-16 19:00:00 UTC
Dark Reading
Dark Reading
Five Indicted on Romance and Lottery Fraud Charges

Fraudsters allegedly targeted elderly victims, ultimately wringing more than $4 million from their bank accounts.

2020-03-16 17:16:00 UTC
ThreatPost
ThreatPost
Microsoft Edge Shares Privacy-Busting Telemetry, Research Alleges

An academic study found Microsoft's Edge browser to be the least private, due to it sending device identifiers and web browsing pages to back-end servers.

Privacy Web Security Back-end Servers Browser Rankings Device Identifiers Least Private Browser Microsoft Microsoft Browser Microsoft Edge Microsoft Privacy Research Trinity College UUID Web Browser Yandex
2020-03-16 16:47:00 UTC
HackRead
HackRead
Coronavirus related cyber attacks hit HHS in US, testing center in Czech

By Deeba Ahmed

Who could have imagined cyber criminals will use Coronavirus pandemic to steal data and make quick money?

This is a post from HackRead.com Read the original post: Coronavirus related cyber attacks hit HHS in US, testing center in Czech

Cyber Attacks Cyber Crime Coronavirus CovidLock Cyber Attack DDOS Hacking Malware Ransomware
2020-03-16 15:20:00 UTC
The Daily Swig
The Daily Swig
BookStack struck by RCE security bug

App needs re-binding to guard against PHP-related security flaw

2020-03-16 14:00:00 UTC
Dark Reading
Dark Reading
4 Ways Thinking 'Childishly' Can Empower Security Professionals

Younger minds -- more agile and less worried by failure -- provide a useful model for cyber defenders to think more creatively.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
20 May 2024
BREACHAWARE HQ

A total of 25 breaches were found and analysed resulting in 61,491,599 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included The Post Millennial, Share This, Book 24, Stealer Log 0457 and Stealer Log 0459