Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-09-13 13:17:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Intel: SSH-stealing NetCAT bug not really a problem

There's another vulnerability in Intel chips, with another catchy name: NetCAT.

Intel Security Threats Vulnerability Data Direct I/O Intel Intel Chips Keystroke Timing Attack NetCAT
2019-09-13 12:50:00 UTC
ThreatPost
ThreatPost
News Wrap: IoT Radio Telnet Backdoor And ‘SimJacker’ Active Exploit

Threatpost editors Tara Seals and Lindsey O'Donnell talk about the top news stories of the week - from leaky databases to SIM card attacks.

Hacks IoT Malware Podcasts Backdoor Data Expose Database Elasticsearch Server IoT Security Podcast Sim Simjacker Telnet
2019-09-13 12:43:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Leaky database full of fake Groupon emails turns out to belong to crooks

Crooks made bogus accounts to buy tickets with fake credit cards, resold them to unsuspecting buyers, and left the database-o-fraud wide open.

Data Loss Security Threats Vulnerability Elasticsearch Fraud Groupon NeuroTicket Noam Rotem Ran Locar Ransom Ticketmaster Tickets TickPick VpnMentor
2019-09-13 11:45:00 UTC
ThreatPost
ThreatPost
Cybercriminals Adding Sophistication to BEC Threats

New tactics aimed at business executives and users are being used to reap greater reward from email based fraud, which continues to rise, researchers said.

Government Hacks Malware Web Security BEC Business Email Compromise Department Of Justice Email Email Threats Operation ReWired
2019-09-13 10:54:00 UTC
The Daily Swig
The Daily Swig
The end is nigh: Browser-makers ditch support for aging TLS 1.0, 1.1 protocols

Website owners have roughly six months to upgrade or risk disruption to domain access

2019-09-13 10:47:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Mozilla Private Network VPN gives Firefox another privacy boost

Is this week's test pilot launch of Mozilla Private Network the moment browser VPNs finally become a must-have privacy feature?

Firefox Google Mozilla Organisations Privacy Web Browsers 1.1.1.1 Browser Privacy Chrome Cloudflare DNS DNS-over-HTTPS DoH Firefox Focus Vpn
2019-09-13 10:17:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Fin7 sysadmin pleads guilty to running IT for billion-dollar crime syndicate

Fedir Oleksiyovich Hladyr is the first member of the infamous cybercrime network to be found guilty of hacking-related crimes in a US court.

Data Loss Law & Order Malware Phishing Admin Breach Carbanak Group Combi Security Fedir Hladyr Fin7 Hipchat Joker Stash Navigator Group Pen Testing Penetration Testing Phishing POS Systems Social Engineering Sysadmin Systems Administrator Wire Fraud
2019-09-12 20:00:00 UTC
Dark Reading
Dark Reading
Indictments Do Little to Stop Iranian Group from New Attacks on Universities

Cobalt Dickens targeted more than 60 universities in the US and elsewhere this summer, according to a new report.

2019-09-12 18:45:00 UTC
Dark Reading
Dark Reading
North Korea Seen Using ELECTRICFISH, BADCALL Malware Variants

The FBI and CISA issued an alert the same week researchers disclosed a new campaign launched by actors with North Korean ties.

2019-09-12 18:00:00 UTC
Dark Reading
Dark Reading
A Definitive Guide to Crowdsourced Vulnerability Management

Knowing about a bug and actually securing it are very different things. These six steps will get you from "oh, sh*t" to fixed.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451