Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-05 20:43:00 UTC
ThreatPost
ThreatPost
Virus Bulletin 2018: Saudi Dissident Spyware Attack Belies Bigger Threat

A spyware attack on a Saudi dissident living in Canada made headlines this week, but Citizen Lab warns that simpler attacks are the real epidemic.

Government Malware Mobile Security Privacy Citizen Lab Civil Society Cyber Attacks Dissidents Epidemic NSO Group Pegasus Phishing Spyware Virus Bulletin 2018
2018-10-05 20:30:00 UTC
Dark Reading
Dark Reading
Most Home Routers Are Full of Vulnerabilities

More than 80% of surveyed routers had, on average, 172 security vulnerabilities, new research shows.

2018-10-05 19:45:00 UTC
Krebs on Security
Krebs on Security
Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

From time to time, there emerge cybersecurity stories of such potential impact that they have the effect of making all other security concerns seem minuscule and trifling by comparison. Yesterday was one of those times. Bloomberg Businessweek on Thursday published a bombshell investigation alleging that Chinese cyber spies had used a U.S.-based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. There aren't any corroborating accounts of this scoop so far, but it is both fascinating and terrifying to look at why threats to the global technology supply chain can be so difficult to detect, verify and counter.

A Little Sunshine Latest Warnings
2018-10-05 19:07:00 UTC
ThreatPost
ThreatPost
D-Link Patches RCE Bugs in Wireless Access Point Gear

 D-Link has released the beta version of the controller which addresses the reported vulnerabilities.

Vulnerabilities Cross-site Scripting CVE-2018-17440 CVE-2018-17441 CVE-2018-17442 CVE-2018-17443 D-Link FTP Remote Code Execution
2018-10-05 18:30:00 UTC
Dark Reading
Dark Reading
Successful Scammers Call After Lunch

Analysis of 20,000 voice phishing, or vishing, calls reveals patterns in how hackers operate.

2018-10-05 17:14:00 UTC
ThreatPost
ThreatPost
Threatpost New Wrap Podcast For Oct. 5

Threatpost editors discuss the highlights and biggest breaking news from this past week.

Podcasts Amazon Apple Bloomberg BSIMM China Facebook Facebook Breach Podcast Routers Supermicro
2018-10-05 16:45:00 UTC
Dark Reading
Dark Reading
12 AppSec Activities Enterprises Can't Afford to Skip

The latest Building Security in Maturity Model (BSIMM9) report offers a statistically backed, bare-minimum benchmark for software security initiatives.

2018-10-05 16:16:00 UTC
ThreatPost
ThreatPost
Virus Bulletin 2018: Exposing the Social Media Fraud Ecosystem

The business of fake likes and followers turns out to be a sprawling enterprise -- likely tied back to IoT botnet activity.

Uncategorized Ecosystem Gosecure Influence Campaigns IoT Botnet Linux/moose Resellers Social Media Fraud Supply Chain Virus Bulletin 2018
2018-10-05 14:30:00 UTC
Dark Reading
Dark Reading
Who Do You Trust? Parsing the Issues of Privacy, Transparency & Control

Technology such as Apple's device trust score that decides "you" is "not you" is a good thing. But only if it works well.

2018-10-05 14:22:00 UTC
The Daily Swig
The Daily Swig
‘Check behind you – hackers are always watching’

Top infosec trends in the social media spotlight this week.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
20 May 2024
BREACHAWARE HQ

A total of 25 breaches were found and analysed resulting in 61,491,599 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included The Post Millennial, Share This, Book 24, Stealer Log 0457 and Stealer Log 0459