Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSSecurity researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.
An email scam from earlier this year has resurfaced on Facebook - don't fall for it!
This is a "game changer" when it comes to genetic privacy rights, experts say.
Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks.
A targeted campaign is delivering an information-stealing malware called Predator the Thief.
Trend Micro customers whose data was sold are getting scam calls from criminals purporting to be support staff.
Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage.
Facebook said that 100+ third-party app developers had access to restricted data for members of Groups, in its latest privacy snafu.
SAMMv2, Juice Shop, and testing guide among topics covered during 24-hour security event
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESThis treasur...
Weekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 24 breaches were found and analysed resulting in 87,916,303 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included AT&T Division, US Consumer Opt In Records, Gosuslugi [2], Kava CasinoLife Poker and Stealer Log 0438