Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSCross-strike scripting
By Uzair Amir
To many people, the idea of using a VPN is still in its infancy while some believe that VPNs are for those who often use public Wi-Fi networks.
This is a post from HackRead.com Read the original post: The Benefits of Using a VPN at Home
A spearphishing campaign first uncovered in July is hitting more utilities firms and spreading the LookBack malware, which has capabilities to view system data and reboot machines.
The security update fixes a vulnerability that could allow an attacker to remotely execute code at the same privilege as the legitimate user.
The victims, who post car reviews and other videos about the auto industry, were targeted in a seemingly coordinated campaign to steal account access.
Institutions urged to add cyber education to syllabus
Google is tightening its privacy controls over its Google Assistant voice assistant after a report earlier this year found that it was eavesdropping on user conversations.
Scam provokes wider debate into the capabilities of browser extensions
A Change.org petition is demanding stronger accountability for Equifax in the 2017 leak that affected 150 million customers.
This is the second such suit, with shareholders asking why execs sold $40m+ of their shares while downplaying the ransomware attack.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESWeekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451