Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-11-27 02:08:00 UTC
Krebs on Security
Krebs on Security
It’s Way Too Easy to Get a .gov Domain Name

Many readers probably believe they can trust links and emails coming from U.S. federal government domain names, or else assume there are at least more stringent verification requirements involved in obtaining a .gov domain versus a commercial one ending in .com or .org. But a recent experience suggests this trust may be severely misplaced, and that it is relatively straightforward for anyone to obtain their very own .gov domain.

The Coming Storm Web Fraud 2.0 CISA Cybersecurity And Infrastructure Security Agency DOTGOV Bill Dotgov.gov Exeterri.gov John Levine Town.exeter.ri.us U.S. Department Of Homeland Security U.S. General Services Administration
2019-11-26 20:34:00 UTC
ThreatPost
ThreatPost
Austin Man Indicted for Stealing Unreleased Music from Artists

He and co-conspirators stole 50 gigs of music and leaked some of it onto the internet.

Breach Cloud Security Hacks Austin Christian Erazo Hacking Impersonation Indictment Music Producer Stolen Music Unreleased Music
2019-11-26 19:55:00 UTC
Dark Reading
Dark Reading
On the Border Warns of Data Breach

Malware on a payment system could have stolen credit card info from customers in 28 states, according to the company.

2019-11-26 19:44:00 UTC
ThreatPost
ThreatPost
Magecart Group Switches Up Tactics with MiTM, Phishing

This new skimming/phishing hybrid threat tactic means that even stores that send customers to external payment processors are vulnerable.

Web Security Analysis Card Skimming Carding Store Riskiq Fullzhouse Magecart Man In The Middle Phishing PII
2019-11-26 19:00:00 UTC
Dark Reading
Dark Reading
DDoS: An Underestimated Threat

Distributed denial-of-service (DDoS) attacks have become more common, more powerful, and more useful to attackers. Here's how to fight back.

2019-11-26 17:25:00 UTC
Dark Reading
Dark Reading
NYPD Pulls Fingerprint Database Offline Due to Ransomware Scare

An infected minicomputer distributed an unidentified threat to 23 machines connected to the LiveScan fingerprint tracking system.

2019-11-26 17:19:00 UTC
The Daily Swig
The Daily Swig
Fortinet took 18 months to strip software of flawed crypto cipher and keys

Major information disclosure and eavesdropping slipup now fixed

2019-11-26 16:12:00 UTC
ThreatPost
ThreatPost
Managing the Human Security Factor in the Age of Ransomware

Convincing employees to take security seriously takes more than awareness campaigns.

InfoSec Insider Malware Web Security Derek Manky Employee Training Fortinet Gamification Human Factor Infosec Insider Phishing Ransomware Security Hygiene Social Engineering
2019-11-26 13:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Naked Security needs an intern! Here’s how to apply

Naked Security is looking for a content marketing intern to join the team for 12 months in 2020.

Uncategorized Content Marketing Internship
2019-11-26 13:32:00 UTC
Krebs on Security
Krebs on Security
Sale of 4 Million Stolen Cards Tied to Breaches at 4 Restaurant Chains

On Nov. 23, one of the cybercrime underground's largest bazaars for buying and selling stolen payment card data announced the immediate availability of some four million freshly-hacked debit and credit cards. KrebsOnSecurity has learned this latest batch of cards was siphoned from four different compromised restaurant chains that are most prevalent across the midwest and eastern United States.

Data Breaches The Coming Storm Focus Brands Gemini Advisory Joker's Stash Krystal Breach McAlister's Deli Breach Moe's Breach Payment Card Industry Security Standards PCI Schlotsky's Breach Verizon

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451