Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-03-10 14:17:00 UTC
Krebs on Security
Krebs on Security
FBI Arrests Alleged Owner of Deer.io, a Top Broker of Stolen Accounts

FBI officials last week arrested a Russian computer security researcher on suspicion of operating deer.io, a vast marketplace for buying and selling stolen account credentials for thousands of popular online services and stores.

Kirill V. Firsov was arrested Mar. 7 after arriving at New York's John F. Kennedy Airport, according to court documents unsealed Monday. Prosecutors with the U.S. District Court for the Southern District of California allege Firsov was the administrator of deer.io, an online platform that hosted more than 24,000 shops for selling stolen and/or hacked usernames and passwords for a variety of top online destinations.

Breadcrumbs Ne'er-Do-Well News Antichat Firsov Arrest Firsov Indictment Hm@mail.ru ISIS Kirill Firsov Xeka
2020-03-10 14:00:00 UTC
Dark Reading
Dark Reading
How Network Metadata Can Transform Compromise Assessment

Listen more closely and your network's metadata will surrender insights the bad guys counted on keeping secret

2020-03-10 13:00:00 UTC
ThreatPost
ThreatPost
Variant of Paradise Ransomware Targets Office IQY Files

Threat actors can easily infiltrate networks because attacks evade detection by typical security protections.

Uncategorized Cyber Attacks Encryption Excel IQY Files Lastline Malware Microsoft Office Paradise Ransomware Threat Actors
2020-03-10 12:52:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Watch out for Office 365 and G Suite scams, FBI warns businesses

The FBI has warned users of Microsoft Office 365 and Google G Suite hosted email about Business Email Compromise (BEC) scams.

BEC Google Microsoft Security Threats Business Email Compromise FBI G Suite Hosted Email IC3 MFA Office 365
2020-03-10 12:35:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google data puts innocent man at the scene of a crime

The man became a suspect because location data from his Android phone was swept up in a surveillance dragnet called a geofence warrant.

Android Google Law & Order Mobile Privacy 4th Amendment Bluetooth Burglary Crime Scene Dragnet Florida Fourth Amendment Gainesville Geofence Warrant GPS RunKeeper Sensorvault Surveillance Tracking Unreasonable Search Unreasonable Searches And Seizures Wi-fi Zachary McCoy
2020-03-10 12:07:00 UTC
HackRead
HackRead
7 Cybersecurity Trends to Look Out for in 2020

By Waqas

Fortunately, predicting the coming cybersecurity trends in 2020 is easier with the help of log events that reveal how data breaches and attacks have occurred in the past. So what cybersecurity trends are in store for 2020?

This is a post from HackRead.com Read the original post: 7 Cybersecurity Trends to Look Out for in 2020

Cyber Events Cyber Attack Cyber Security Infosec Security Vulnerbility
2020-03-10 12:04:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Ex-Inspector General indicted for stealing data on 250k govt colleagues

Crime doesn't pay, even if you have the audacity to try to sell your employer its own, free software and personal data on your own colleagues.

Data Loss Government Security Law & Order Security Threats Agriculture Department Charles K. Edwards Delta Business Solutions Department Of Homeland Security DHS Employee Data Indictment Insider Insider Theft Insider Threats Inspector General IP Theft Murali Yamazula Venkata Office Of Inspector General OIG Pii Rogue Employee Sonal Patel Theft
2020-03-10 11:34:00 UTC
The Daily Swig
The Daily Swig
Jenkins security: Latest advisory highlights more than 20 vulnerable plugins

Security add-on with nearly 250,000 installations included in patch list

2020-03-10 11:04:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Phone carriers may soon be forced to adopt anti-robocall tech

US carriers haven't been doing enough to block robocalls voluntarily. The Federal Communications Commission's response? Fine - we'll make you.

Privacy FCC Federal Trade Commission Robocaller Legislation Robocallers Robocalls SHAKEN/STIR Tele Scams Telephone Robocall Abuse Criminal Enforcement And Deterrence (TRACED) Act Telephone Scams
2020-03-10 10:00:00 UTC
ThreatPost
ThreatPost
Spear-Phishing Attack Lures Victims With ‘HIV Results’

Attackers are purporting to send victims HIV test results - but in reality are convincing them to download the Koadic RAT.

Web Security HIV Phishing Koadic RAT Phishing Phishing Lure RAT Remote Access Trojan Spear Phishing

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
March 2024
By SUE DENIM
TikTok Ban, Discord Bot Community Attack, and Telecom Company's Breach Resurgence.
Ah, the dramatic saga of TikTok in the United States! Picture this: a ban looming over TikTok, akin to a dark cloud threatening to rain on our digital parade. Congress is all up in arms, waving their "think of the children" banners while TikTok nervously checks its watch, wondering if it should start packing its bags for a forced sale. Meanwhile, nobody bats an eye at the plethora of Chinese gadge...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451