Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-09 12:22:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Apple’s scanning iCloud photos for child abuse images

It isn't new, all the tech giants do it, and your privacy's intact - unless you're dealing in illegal imagery with telltale hashing.

Apple Law & Order Privacy CES Child Abuse Imagery Child Porn Consumer Electronics Show Hashing ICloud Image Matching Jane Horvath PhotoDNA
2020-01-09 12:02:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google voice Assistant gets new privacy ‘undo’ commands

Google’s controversial voice Assistant is getting a series of new commands designed to work like privacy-centric ‘undo’ buttons.

Android Google Privacy AI Alexa Bixby Cortana Google Voice Assistant OK Google Siri Smart Speakers Voice Control
2020-01-09 11:41:00 UTC
Naked Security | Sophos
Naked Security | Sophos
FBI asks Apple to help it unlock iPhones of naval base shooter

This could signal a renewed war between Apple and law enforcement over breaking encryption.

Apple Cryptography IOS Law & Order Mobile Privacy #nobackdoors Cellebrite Dana Boente FBI Forensics IPhone IPhone Cracking Mobile Phone Data Mohammed Saeed Alshamrani Murder Murderers Pensacola Saudi Royal Air Force US Naval Base
2020-01-09 11:26:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google’s Project Zero highlights patch quality with policy tweak

Google's Project Zero bug-hunting team has tweaked its 90-day responsible disclosure policy to help improve the quality and adoption of vendor patches.

Google Security Threats Vulnerability Bug Bounty Bug Disclosure Bug-hunting Project Zero Responsible Disclosure
2020-01-09 11:00:00 UTC
ThreatPost
ThreatPost
TrickBot Adds Custom, Stealthy Backdoor to its Arsenal

The PowerTrick backdoor, which fetched yet other backdoors, is designed to help TrickBot evade detection.

Malware Backdoor Custom Malware Detection Evasion PowerShell Powertrick TrickBot
2020-01-09 09:52:00 UTC
The Daily Swig
The Daily Swig
India’s answer to GDPR: Data protection legislation set to pass this year

But critics condemn sweeping government exemptions

2020-01-09 01:45:00 UTC
Dark Reading
Dark Reading
Las Vegas Suffers Cyberattack on First Day of CES

The attack, still under investigation, hit early in the morning of Jan. 7.

2020-01-08 23:22:00 UTC
ThreatPost
ThreatPost
Drake Lyrics Used as Calling Card in Malware Attack

A hacker who apparently likes the musician Drake leaves lyrics from the artist's song In My Feelings behind in an attack that delivers malware Lokibot or Azorult.

Malware Azorult Business Email Compromise Drake LokiBot Malware Paste.ee Pastebin Powerpoint PowerShell
2020-01-08 20:21:00 UTC
ThreatPost
ThreatPost
Man Sentenced in ATM Skimming Conspiracy

A Romanian national has been sentenced to 5 years in prison after racking up almost $400,000 in an ATM skimming scheme.

Vulnerabilities
2020-01-08 20:10:00 UTC
ThreatPost
ThreatPost
Google Ditches Patch-Time Bug Disclosure in Favor of 90-Day Policy

Project Zero vulnerability disclosures will now happen at 90 days, even if a patch becomes available before then.

Bug Bounty Vulnerabilities 90 Days Coordinated Disclosure Google Policy Changes Project Zero Vulnerability Disclosure

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451