Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-02-20 12:23:00 UTC
The Daily Swig
The Daily Swig
Cybercriminals hammer APIs in a bid to bypass stronger authentication – report

Financial services orgs face a growing onslaught of API endpoint attacks

2020-02-20 11:48:00 UTC
ThreatPost
ThreatPost
MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer

This week a hacking forum posted data from the breach—which included personal and contact details for celebrities, tech CEOs, government officials and employees at large tech companies.

Breach Cloud Misconfiguration Cloud Server Cybercrime Cybercriminals Data Breach Data Leak Hackers Hacking Forum Justin Bieber MGM Grand Personal Details Phishing Threat Actors Twitter
2020-02-20 11:20:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Firefox 73.0.1 fixes crashes, blank web pages and DRM niggles

Firefox version 73 has only been out for a week but already Mozilla has had to update it to v73.0.1 to fix a range of browser problems.

Firefox Mozilla Security Threats Vulnerability Web Browsers 0Patch DNS-over-HTTPS NextDNS
2020-02-20 10:03:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Ring makes 2FA mandatory to keep hackers out of your doorbell account

Amazon is following Google's lead by forcing all users to use two-factor authentication when logging into their Ring accounts.

2-factor Authentication Amazon IoT Security Threats 2FA Credential Stuffing Data Sharing Doorbell Internet Of Things Iot Neighbors Password Reuse Ring Video Doorbell Webcam
2020-02-19 23:30:00 UTC
Dark Reading
Dark Reading
Researchers Fool Smart Car Camera with a 2-Inch Piece of Electrical Tape

McAfee researchers say they were able to get a Tesla to autonomously accelerate by tricking its camera platform into misreading a speed-limit sign.

2020-02-19 22:17:00 UTC
ThreatPost
ThreatPost
U.S. Pipeline Disrupted by Ransomware Attack

The attack took a gas compression facility offline for two days, disrupting the supply chain.

Critical Infrastructure Malware Critical Infrastructure Cyberattack Gas Compression Facility ICS Industrial Environments Loss Of View Offline Pipeline Programmable Logic Controllers Ransomware
2020-02-19 20:29:00 UTC
ThreatPost
ThreatPost
BlueKeep Flaw Plagues Outdated Connected Medical Devices

More than 55 percent of medical imaging devices - including MRIs, XRays and ultrasound machines - are powered by outdated Windows versions, researchers warn.

IoT Vulnerabilities Bluekeep Cyberattack Hospital Medical Medical Imaging Medical Security Microsoft Microsoft Windows Vulnerability Windows Patch Windows RDP
2020-02-19 19:08:00 UTC
HackRead
HackRead
US Natural Gas-Compression facility cripples after ransomware attack

By Deeba Ahmed

Another day, another ransomware attack - This time, hackers have hit critical infrastructure of the government of the United States.

This is a post from HackRead.com Read the original post: US Natural Gas-Compression facility cripples after ransomware attack

Cyber Attacks Malware Security CISA Cyber Attack Encryptoin Hacking Ransomware Security USA
2020-02-19 19:00:00 UTC
Dark Reading
Dark Reading
Zero-Factor Authentication: Owning Our Data

Are you asking the right questions to determine how well your vendors will protect your data? Probably not.

2020-02-19 18:05:00 UTC
Dark Reading
Dark Reading
44% of Security Threats Start in the Cloud

Amazon Web Services is a top source of cyberattacks, responsible for 94% of all Web attacks originating in the public cloud.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
20 May 2024
BREACHAWARE HQ

A total of 25 breaches were found and analysed resulting in 61,491,599 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included The Post Millennial, Share This, Book 24, Stealer Log 0457 and Stealer Log 0459