Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-20 23:13:00 UTC
Krebs on Security
Krebs on Security
DDoS Mitigation Firm Founder Admits to DDoS

A Georgia man who co-founded a service designed to protect companies from crippling distributed denial-of-service (DDoS) attacks has pleaded to paying a DDoS-for-hire service to launch attacks against others.

DDoS-for-Hire Ne'er-Do-Well News BackConnect Security LLC Free Software Foundation Mirai Richard Stallman Tucker Preston U.S. Justice Department VDos
2020-01-20 18:49:00 UTC
HackRead
HackRead
New sextortion scam claims recording you with hacked Google Nest cam

By Waqas

The difference between conventional sextortion campaigns and this one is that the victim has to go through...

This is a post from HackRead.com Read the original post: New sextortion scam claims recording you with hacked Google Nest cam

Cyber Crime Phishing Scam Scams And Fraud Camera Fraud Google Hacking IoT NEST Phishing Scam Security
2020-01-20 18:49:00 UTC
HackRead
HackRead
New sextortion scam claims to record you with hacked Google Nest cam

By Waqas

The difference between conventional sextortion campaigns and this one is that the victim has to go through...

This is a post from HackRead.com Read the original post: New sextortion scam claims to record you with hacked Google Nest cam

Cyber Crime Phishing Scam Scams And Fraud Camera Fraud Google Hacking IoT NEST Phishing Scam Security
2020-01-20 16:02:00 UTC
The Daily Swig
The Daily Swig
Citrix releases first patches as attacks against ADC vulnerability go pro

Attackers locking down access to compromised systems, security vendors warn

2020-01-20 16:00:00 UTC
Dark Reading
Dark Reading
Are We Secure Yet? How to Build a 'Post-Breach' Culture

There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.

2020-01-20 15:00:00 UTC
Dark Reading
Dark Reading
Are We Secure Yet? How to Build a "Post-Breach" Culture

There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.

2020-01-20 14:53:00 UTC
The Daily Swig
The Daily Swig
Double Dutch: Netherlands tops GDPR breach report index for second year running

More than 160,000 data breach notifications have been reported across Europe since regulation came into force

2020-01-20 12:40:00 UTC
The Daily Swig
The Daily Swig
Internet Explorer zero-day surfaces in ‘limited targeted attacks’

Microsoft advises users to apply workarounds while it works on patches

2020-01-20 12:21:00 UTC
Naked Security | Sophos
Naked Security | Sophos
FBI seizes credentials-for-sale site WeLeakInfo.com

The FBI has seized the domain for WeLeakInfo.com, a site that sold breached data records, after a multinational effort by law enforcement.

Data Loss Law & Order Security Threats Credentials-for-sale Data Breach Data Leak Data Loss FBI Netherlands Northern Ireland Stolen Credentials Stolen Data UK US WeLeakInfo.com
2020-01-20 11:58:00 UTC
Naked Security | Sophos
Naked Security | Sophos
FBI to inform election officials about hacking attempts

The FBI has announced that it will tell local election officials when hackers try to infiltrate their systems.

Government Security Law & Order Security Threats Election Hacking Election Meddling FBI Hacking

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
06 May 2024
BREACHAWARE HQ

A total of 19 breaches were found and analysed resulting in 6,573,110 leaked accounts containing a total of 22 different data types. The breaches found publicly and freely available included Rendez-Vous, Stealer Log 0454, boAt Lifestyle, Expandia and Intergroup Gold