Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-11-07 17:31:00 UTC
ThreatPost
ThreatPost
Amazon Kindle, Embedded Devices Open to Code-Execution

Flaws in Das U-Boot affect third-party hardware that uses the universal bootloader as an underlying component.

IoT Vulnerabilities Amazon Kindle Arm Devices Buffer Overflow Code Execution Cpu Takeover Das U-boot Denial Of Service Double Free Embedded Devices Forallsecure Memory Corruption Vulnerabilities
2019-11-07 17:00:00 UTC
Dark Reading
Dark Reading
PayPal Upsets Microsoft as Phishers' Favorite Brand

Several factors edged the world's most popular payment service into the top spot.

2019-11-07 16:01:00 UTC
The Daily Swig
The Daily Swig
Red Dead Redemption 2: Rockstar Games announces new addition to its bug bounty program

‘A wider variety of vulnerability reports’ are now within scope

2019-11-07 15:32:00 UTC
ThreatPost
ThreatPost
Gamers Hit with Nvidia GPU Driver, GeForce Flaws

Vulnerabilities in several PC gaming products offered by Nvidia can lead to escalation of privilege, denial of service and other malicious attacks.

Vulnerabilities Gaming Geforce Experience GPU Driver High Severity Flaw Nvidia Nvidia Driver Nvidia Flaw Vulnerabilities
2019-11-07 15:13:00 UTC
Naked Security | Sophos
Naked Security | Sophos
S2 Ep16: BlueKeep, ransomware and sextortion – Naked Security Podcast

BlueKeep's back, ransomware batters Spain, and yet more sextortion - listen now!

Podcast Bitcoin Hacked Webcams Hacker Naked Security Podcast Ransomware Sextortion Sextortion Scam
2019-11-07 15:00:00 UTC
Dark Reading
Dark Reading
The Cold Truth about Cyber Insurance

There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.

2019-11-07 14:38:00 UTC
The Daily Swig
The Daily Swig
Open source tool predicts which security vulnerabilities are most likely to be exploited

Exploit Prediction Scoring System uses machine learning to help security teams prioritize patches

2019-11-07 14:09:00 UTC
ThreatPost
ThreatPost
How to Secure Critical Infrastructure When Patching Isn’t Possible

Mission-critical systems can't just be switched off to apply security updates -- so patching can take weeks if not years.

Critical Infrastructure InfoSec Insider Vulnerabilities Amir Levintal Critical Infrastructure Cyberattacks Cylus ICS Infosec Insider Patching Advice Power Plants SCADA Security Challenges Security Updates Utilities Vulnerabilities
2019-11-07 14:01:00 UTC
Naked Security | Sophos
Naked Security | Sophos
WordPress sites hit by malvertising

An old piece of malware is storming the WordPress community, enabling its perpetrators to take control of sites and inject code of their choosing.

Malvertising Malware Security Threats Vulnerability Malvertising Malware Plugins Wordfence Wordpress WordPress Plugin WP-VCD
2019-11-07 13:45:00 UTC
ThreatPost
ThreatPost
Data Breach Fines: Are They Working to Boost Consumer Safety?

Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise.

Breach Cloud Security Government Hacks Adobe Apple Breach British Airways California Consumer Privacy Act CISO Cyberattacks Cybersecurity Damages Data Breaches Fines GDPR General Data Protection Regulation Human Errors Penalties Phishing Staples The Home Depot Yahoo

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
February 2024
By SUE DENIM
The Truth Behind "The Xun" Repository Bombshell.
Well, well, well, it seems the digital waters are getting murkier by the day. A mysterious GitHub user by the name of I-SOON recently made their grand entrance onto the coding scene, dropping a repository bombshell titled "The Truth Behind an Xun." Inside? Oh, just a casual 200 megabytes of top-secret intel about a Chinese cybersecurity company. Talk about spilling the digital tea!

This treasur...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
25 March 2024
BREACHAWARE HQ

A total of 24 breaches were found and analysed resulting in 87,916,303 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included AT&T Division, US Consumer Opt In Records, Gosuslugi [2], Kava CasinoLife Poker and Stealer Log 0438