Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-09-16 13:13:00 UTC
ThreatPost
ThreatPost
New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware

ReversingLabs identified cybercriminals duping certificate authorities by impersonating legitimate entities and then selling the certificates on the black market.

Hacks Vulnerabilities Web Security Antivirus Certificate Certificate Fraud Certificate Impersonation Cybercrime Digital Certificates Malware
2019-09-16 11:43:00 UTC
Naked Security | Sophos
Naked Security | Sophos
iPhone lockscreen bypass: iOS 13 tricked into showing your contacts

This time, José Rodríguez came up with a way to trick the iOS 13 beta into showing its address book without the need to unlock the screen.

Apple IOS Mobile Privacy Security Threats Vulnerability Bypass Ios IOS 13 IPhone José Rodríguez Lock Screen Lockscreen
2019-09-16 11:35:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google fixes Chromebook 2FA flaw in ‘built-in security key’

Google has discovered a flaw in a Chromebook security feature which allows owners to press their device’s power button to initiate U2F 2FA.

Google Security Threats Technologies Vulnerability 2-Factor Authentication 2FA Chrome Os ChromeBook FIDO U2F Two-factor Authentication U2F
2019-09-16 11:24:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Simjacker silent phone hack could affect a billion users

The shadowy world of phone-surveillance-for-hire became a little clearer last week following the discovery of a phone exploit called Simjacker.

Mobile Privacy Security Threats Technologies AdaptiveMobile Security Phone Hack Phone Security S@T Browse Simjacking Smartphone Privacy SMS SMS Hack
2019-09-16 11:15:00 UTC
The Daily Swig
The Daily Swig
LastPass updates browser add-on to defend against clickjacking threat

Users tricked into disclosing credentials

2019-09-16 11:00:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Tiny Pacific nation forges ahead with national cryptocurrency

The Marshall Islands is facing rising seas and financial isolation. But critics say their get-rich-quick cryptocurrency scheme won't work.

Cryptocurrency Law & Order Blockchain Cryptocurrency Libra Marshall Islands Money Laundering Republic Of The Marshall Islands RMI SOV Timed Release Monetary Issuance TRMI
2019-09-16 09:28:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Monday review – the hot 23 stories of the week

From Intel's SSH-stealing NetCAT bug to Mozilla's VPN - and everything in between. It's the weekly roundup.

Weekly Summary Computer Security Infosec Monday Review News Security News Weekly Roundup
2019-09-14 12:15:00 UTC
Ars Technica
Ars Technica
New clues show how Russia’s grid hackers aimed for physical destruction

2016 Russian cyberattack on Ukraine intended to cause far more damage than it did.

Biz & IT Hacking Russia Security
2019-09-14 00:32:00 UTC
HackRead
HackRead
New Amazon phishing scam stealing credit card data

By Waqas

A new Amazon phishing scam email is circulating, that tricks users into handing over their personal as well as financial information including credit card information to online crooks.

This is a post from HackRead.com Read the original post: New Amazon phishing scam stealing credit card data

Phishing Scam Scams And Fraud Security Amazon Cyber Crime Fraud Phishing Scam Security
2019-09-13 20:52:00 UTC
ThreatPost
ThreatPost
WordPress XSS Bug Allows Drive-By Code Execution

Sites that use the Gutenberg (found in WordPress 5.0 to 5.2.2) are open to complete takeover.

Vulnerabilities Web Security Cross-site Scripting Drive-by Attack Gutenberg Editor Patch Remote Code Execution Version 5.2.3 Vulnerability Website Takeover Wordpress XSS

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451