Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-17 21:46:00 UTC
ThreatPost
ThreatPost
Feds Cut Off Access to Billions of Breached Records with Site Takedown

The WeLeakInfo "data breach notification" domain is no more.

Breach Government Privacy Breached Records Domain Seizure FBI Search Engine Site Takedown Subscription Services Weleakinfo
2020-01-17 21:03:00 UTC
ThreatPost
ThreatPost
Mobile Carrier Customer Service Ushers in SIM-Swap Fraud

Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.

Breach Mobile Security Vulnerabilities 2fa Bypass Account Compromise Challenge Questions Customer Service Line Porting Sim Swap Two Factor Authentication Weak Authentication Wireless Carriers
2020-01-17 20:58:00 UTC
HackRead
HackRead
Keep Your Home Protected: 5 Best Indoor Home Security Cameras

By Waqas

We’ve listed five best indoor security cameras that are worth considering. So, take a read!

This is a post from HackRead.com Read the original post: Keep Your Home Protected: 5 Best Indoor Home Security Cameras

Technology News Camera IoT Privacy Security
2020-01-17 18:49:00 UTC
HackRead
HackRead
Feds seize WeLeakInfo.com for selling stolen databases

By Sudais

WeLeakInfo.com was home to over 10,000 data breaches containing over 12 billion indexed records.

This is a post from HackRead.com Read the original post: Feds seize WeLeakInfo.com for selling stolen databases

Cyber Crime Data Breaches Europe FBI Hacking LEAKS Privacy Security
2020-01-17 18:49:00 UTC
HackRead
HackRead
Feds seize WeLeakInfo.com for selling stolen databases

By Sudais

WeLeakInfo.com was home to over 10,000 data breaches containing over 12 billion indexed records.

This is a post from HackRead.com Read the original post: Feds seize WeLeakInfo.com for selling stolen databases

Cyber Crime Data Breaches Europe FBI Hacking LEAKS Privacy Security
2020-01-17 18:39:00 UTC
ThreatPost
ThreatPost
Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea?

Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?

Hacks Vulnerabilities Cisco Citrix Exploit Code Microsoft Poc Exploit Vulnerability Zero Day Zero Day Flaw
2020-01-17 18:03:00 UTC
ThreatPost
ThreatPost
News Wrap: PoC Exploits, Cable Haunt and Joker Malware

Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.

Hacks Podcasts Vulnerabilities Cable Haunt Critical Vulnerability Exploit Code Google Google Play ISP Joker Malware Poc Podcast Proof-of-concept Exploit Zero Day
2020-01-17 17:48:00 UTC
Naked Security | Sophos
Naked Security | Sophos
5 tips to avoid spear-phishing attacks

Our tips will help you boost your resistance to phishing, even when the crooks make a determined effort to reel you in.

Phishing Burisma Phishing
2020-01-17 17:15:00 UTC
Dark Reading
Dark Reading
Mobile Banking Malware Up 50% in First Half of 2019

A new report from Check Point recaps the cybercrime trends, statistics, and vulnerabilities that defined the security landscape in 2019.

2020-01-17 17:00:00 UTC
The Daily Swig
The Daily Swig
International police arrest two after WeLeakInfo takedown

Search engine for leaked passwords shut down

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451