Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-09-24 10:29:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Apple restricts adblocking extensions

Apple has turned off the ability for adblocking companies to use their own blocking mechanisms in Safari.

Apple Web Browsers Apple Safari Adblocker Safari Web Browsers Ad Blocker Adblocker Browser Extensions Online Ads Content Blocking
2019-09-24 10:29:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Apple restricts old adblocking tech

Apple has turned off the ability for adblocking companies to use their own blocking mechanisms in Safari.

Adblocker Apple Apple Safari Web Browsers Ad Blocker Adblocker Browser Extensions Content Blocking Online Ads Safari Web Browsers
2019-09-24 10:10:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Jira development and ticketing software hit by critical flaws

Admins have a spot of patching work on their hands after the company released updates addressing two critical flaws.

Security Threats Vulnerability Altassian CVEs Jira Data Center Jira Service Desk Data Center Jira Service Desk Server Vulnerability
2019-09-24 09:26:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Instagram phish poses as copyright infringement warning – don’t click!

Your Instagram account has value to the crooks - so they're coming up with some cunning tricks to get at your passsword.

Phishing 2FA Instagram Phishing
2019-09-23 22:25:00 UTC
HackRead
HackRead
Information Security Professional Degeneration

By Ian Trump

If you ask mid-and-advanced-career information security professionals about their jobs in information security, most of them may not express the kindest sentiments.

This is a post from HackRead.com Read the original post: Information Security Professional Degeneration

Cyber Events Cyber Security Hacking Information Security Infosec Security
2019-09-23 22:05:00 UTC
HackRead
HackRead
How to Protect Your Online Store from Cyber Threats

By Owais Sultan

While owning an online store can certainly lead to success, it also opens the door to cyber threats, something that is far too common today.

This is a post from HackRead.com Read the original post: How to Protect Your Online Store from Cyber Threats

Cyber Attacks How To Business Cyber Attacks Security
2019-09-23 21:49:00 UTC
Dark Reading
Dark Reading
JP Morgan Hacker Pleads Guilty
2019-09-23 21:26:00 UTC
HackRead
HackRead
4 Helpful Tips to Make Your WiFi Fast and Efficient

By Uzair Amir

WiFi is great to have in the home — until it is as slow as molasses going uphill. It is frustrating to try to watch a movie or work from home only to have a slow connection put a dent in your day.

This is a post from HackRead.com Read the original post: 4 Helpful Tips to Make Your WiFi Fast and Efficient

How To Internet Technology WIFI
2019-09-23 21:04:00 UTC
HackRead
HackRead
How to Increase Your Business’s Online Brand Awareness

By Owais Sultan

If you want your business to thrive, then you need to build a strong brand for it. How can you expect to boost your sales and subsequently your profit margin if people don’t trust you or even know that you exist? Increasing your business’ brand awareness is an essential job that you face as a […]

This is a post from HackRead.com Read the original post: How to Increase Your Business’s Online Brand Awareness

How To
2019-09-23 20:29:00 UTC
ThreatPost
ThreatPost
Microsoft Internet Explorer Zero-Day Flaw Addressed in Out-of-Band Security Update

Microsoft has issued a patch for an Internet Explorer remote code execution flaw that is being actively exploited in the wild.

Hacks Vulnerabilities Internet Explorer Microsoft Out Of Band Patch Remote Code Execution Vulnerability Zero Day

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451