Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-11-12 18:13:00 UTC
ThreatPost
ThreatPost
Magento Warns E-Commerce Sites to Upgrade ASAP to Prevent Attacks

The platform is a favorite target for the Magecart collective of card-skimming threat groups.

Malware Vulnerabilities Web Security CVE-2019-8144 Magecart Magento Magento 2.3 Malicious Attacks Remote Code Execution Security Warning
2019-11-12 18:10:00 UTC
ThreatPost
ThreatPost
Adobe Patches Critical Bugs in Illustrator, Media Encoder

Adobe’s monthly patch load is low for November, with only three critical bugs and eight important ones fixed.

Vulnerabilities Adobe Adobe Animate Adobe Bridge Adobe Illustrator Adobe Patches Adobe Security Advisory Critical Bug Media Encoder Mobile SDK November 2019 Patch Tuesday Remote Code Execution
2019-11-12 18:00:00 UTC
Dark Reading
Dark Reading
SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?

The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.

2019-11-12 17:55:00 UTC
Dark Reading
Dark Reading
DDoS Attack Targets UK Labour Party Weeks Ahead of Election

Cybercriminals tried to take the Labour Party's digital platforms offline weeks before the election on December 12.

2019-11-12 17:21:00 UTC
The Daily Swig
The Daily Swig
Cheats, hacks, and cyber-attacks: Cybercrime in Esports poised to soar

A virtual environment awash with cash are the dreams of cybercrime

2019-11-12 17:21:00 UTC
The Daily Swig
The Daily Swig
Cheats, hacks, and cyber-attacks: Esports cybercrime poised to soar

Virtual environment awash with cash present their own unique set of security challenges

2019-11-12 15:21:00 UTC
The Daily Swig
The Daily Swig
WordPress 5.3 launches with security enhancements and PHP 7.4 support

Last major core release of 2019 also includes accessibility improvements and email verification

2019-11-12 15:00:00 UTC
Dark Reading
Dark Reading
Why Cyber-Risk Is a C-Suite Issue

Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.

2019-11-12 12:03:00 UTC
The Daily Swig
The Daily Swig
Excel zero-day on macOS reloaded

Difficult-to-exploit bug no longer limited to Office 2011. Will Microsoft patch?

2019-11-12 12:02:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Apple to fix Siri bug that exposed parts of encrypted emails

Apple may care about your privacy but that doesn't mean it gets it right all the time, especially when it comes to training its Siri AI assistant.

Apple IOS Operating Systems OS X Privacy Security Threats AI Ai Assistant Bob Gendler Ios MacOS Siri

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451