Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-02-27 13:19:00 UTC
Naked Security | Sophos
Naked Security | Sophos
S2 Ep28: Stalkerware, when cybercrooks return, and phishing gone wild – Naked Security Podcast

Listen to the latest episode now!

Podcast Cybersecurity Naked Security Naked Security Podcast Phishing Ransomware Ransomware Attack Stalkerware
2020-02-27 11:32:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Brave beats other browsers in privacy study

Users looking for a privacy-focused browser might want to consider Brave first, according to a study published this week.

Apple Apple Safari Brave Firefox Google Google Chrome Microsoft Microsoft Edge Mozilla Privacy Web Browsers Yandex "Edge" Browser Privacy Chrome Safari Web Browsers
2020-02-27 11:02:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Chrome 80 encryption change blocks AZORult password stealer

Evidence is emerging that a change made to Chrome 80 might have disrupted the popular data and user profile stealing malware AZORult.

Google Google Chrome Malware Web Browsers AZORult Browser Security Chrome Chrome 80 KELA Malware Mimikatz Password Manager Web Browsers
2020-02-27 10:54:00 UTC
The Daily Swig
The Daily Swig
The latest government data breaches in 2019/2020

With new government data breaches being reported on a daily basis, the security of public sector organizations is more important than ever before

2020-02-27 10:50:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Facebook bans coronavirus ‘miracle cure’ ads

Facebook, like other platforms, has seen fake news, mass-buying of face masks, and misinformation about bleach being a cure for COVID-19.

Facebook Fake News Instagram Phishing Social Networks Spam Clickbait Coronavirus COVID-19 Facebook Ranking Fake News Health Miracle Cure Ranking Spam
2020-02-27 05:00:00 UTC
Dark Reading
Dark Reading
State of Cybersecurity Incident Response

Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.

2020-02-27 04:07:00 UTC
ThreatPost
ThreatPost
Billions of Devices Open to Wi-Fi Eavesdropping Attacks

The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.

Cryptography IoT Mobile Security RSAC Vulnerabilities Apple Devices Broadcom CVE-2019-15126 Cypress Encryption Kr00k KRACK Security Flaw Vulnerability Wi-fi Chips
2020-02-27 03:56:00 UTC
ThreatPost
ThreatPost
RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers

A popular baby monitor has been found riddled with vulnerabilities that give attackers full access to personal information and sensitive video footage.

Hacks IoT RSAC AWS Ibaby Monitor Indirect Object Reference Internet Of Things Security Iot Flaw MQTT RSA RSA Conference S3 Bucket
2020-02-26 23:20:00 UTC
HackRead
HackRead
Top 10 worst countries for Internet freedom & censorship

By Sudais Asif

Internet censorship is a tool used by governments around the world and here are the top 10 countries being worst at it.

This is a post from HackRead.com Read the original post: Top 10 worst countries for Internet freedom & censorship

Censorship Surveillance Internet Privacy
2020-02-26 22:27:00 UTC
ThreatPost
ThreatPost
RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks

When it comes to machine learning, research and cybercriminal activity is full speed ahead - but legal policy has not yet caught up.

RSAC Ai Artificial Intelligence Evasion Attack Machine Learning Machine Learning Policy Ml Poisoning Attack Policy RSA Rsac 2020

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
06 May 2024
BREACHAWARE HQ

A total of 19 breaches were found and analysed resulting in 6,573,110 leaked accounts containing a total of 22 different data types. The breaches found publicly and freely available included Rendez-Vous, Stealer Log 0454, boAt Lifestyle, Expandia and Intergroup Gold