Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-11-22 13:59:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google plans to take Android back to ‘mainline’ Linux kernel

Android could be returning to its roots.

Android Google Android Patching Linux Kernel Project Fuchsia Project Treble
2019-11-22 13:32:00 UTC
ThreatPost
ThreatPost
Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways

Financial institutions are in the crosshairs of hackers leveraging the malware to steal sensitive data.

Malware Business Email Compromise CVE-2017-8570 Email Gateway Info-stealer Malware Raccoon Stealer
2019-11-22 13:32:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Iran’s APT33 sharpens focus on industrial control systems

Iran's elite hacking group is upping its game, according to new evidence delivered at a cybersecurity conference this week.

Government Security Security Threats APT33 Cylance Hack Hacking Iran Operation Cleaver TURNEDUP
2019-11-22 13:00:00 UTC
ThreatPost
ThreatPost
News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router Flaws

From stalkerware to Amazon Ring doorbell outrage, Threatpost editors break down the top news stories of the week.

Podcasts Privacy Vulnerabilities Amazon Amazon Ring D-Link Dlink Router IoT Retina-x Ring Doorbell Stalkerware Unpatched Flaw
2019-11-22 13:00:00 UTC
The Daily Swig
The Daily Swig
Cybersecurity becoming top priority in the boardroom, say industry leaders

Security education, regulation, and strategy placed front and center at London business summit

2019-11-22 11:53:00 UTC
ThreatPost
ThreatPost
Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip

The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security.

Vulnerabilities Web Security Android Android Security Rewards Bug Bounty Device Security Google Google Play Hackers Mobile Security Pixel Titan M Vulnerabilities
2019-11-22 11:12:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Why do cryptocurrency scams work and how do you avoid them?

What are ICOs, why are they so popular and why do crooks love them so much?

Cryptocurrency Cryptocoin Cryptocurrency Cybercrime Ico Ponzi Scam
2019-11-22 11:12:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Why do cryptocoin scams work, and how to avoid them?

What are ICOs, why are they so popular and why do crooks love them so much?

Cryptocurrency Cryptocoin Cryptocurrency Cybercrime Ico Ponzi Scam
2019-11-22 11:12:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Why cryptocoin scams work, and how to avoid them

What are ICOs, why are they so popular and why do crooks love them so much?

Cryptocurrency Cryptocoin Cryptocurrency Cybercrime Ico Ponzi Scam
2019-11-22 11:11:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Convicted Nigerian fraudster keeps a-fraudin’ from behind bars

He was supposed to be serving a 24-year sentence in the "maximum security" prison, not continuing the fraud... and going to parties.

Law & Order Mobile Contraband Convict Efcc Fraud Hope Olusegun Aroke Mobile Phones Nigeria Prison

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
March 2024
By SUE DENIM
TikTok Ban, Discord Bot Community Attack, and Telecom Company's Breach Resurgence.
Ah, the dramatic saga of TikTok in the United States! Picture this: a ban looming over TikTok, akin to a dark cloud threatening to rain on our digital parade. Congress is all up in arms, waving their "think of the children" banners while TikTok nervously checks its watch, wondering if it should start packing its bags for a forced sale. Meanwhile, nobody bats an eye at the plethora of Chinese gadge...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
22 April 2024
BREACHAWARE HQ

A total of 11 breaches were found and analysed resulting in 8,670,369 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included A MONEY, Raychat, Bin Weevils, ZOON and Stealer Log 0450