Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-05 12:33:00 UTC
HackRead
HackRead
Don’t ever use a VPN without paying attention to these five things

By John Mason

Ryan Lin was just recently sentenced to 17 years in prison. He was sentenced for committing a range of crimes including cyberstalking, computer fraud and abuse, aggravated identity theft, and distribution of child pornography. These are all serious crimes that I in no way support or condone, but why am I particularly interested in the […]

This is a post from HackRead.com Read the original post: Don’t ever use a VPN without paying attention to these five things

Privacy Security Cyber Crime DNS Security Surveillance VPN
2018-10-04 20:35:00 UTC
Dark Reading
Dark Reading
US Indicts 7 Russian Intel Officers for Hacking Anti-Doping Organizations

Netherlands expels four of the suspects trying to break into an organization investigating a chemical used in the recent attack on a former Russian spy in Britain.

2018-10-04 20:30:00 UTC
Dark Reading
Dark Reading
7 Steps to Start Your Risk Assessment

Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.

2018-10-04 19:30:00 UTC
Dark Reading
Dark Reading
Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards

If true, the attack using Supermicro motherboards could be the most comprehensive cyber breach in history.

2018-10-04 19:25:00 UTC
ThreatPost
ThreatPost
ThreatList: 83% of Routers Contain Vulnerable Code

Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.

IoT Vulnerabilities Web Security American Consumer Institute Belkin CCTV Cameras Cyberattacks D-Link DVRs Firmware Updates Linksys NAS Devices NETGEAR Routers Wi-Fi
2018-10-04 19:14:00 UTC
ThreatPost
ThreatPost
Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets

Russian-speaking Turla has also racked up more victims in its latest APT campaign.

Government Malware Apt Backdoor Innovation Malware Snake Turla Uroboros
2018-10-04 18:33:00 UTC
HackRead
HackRead
Chinese surveillance chips found in servers used by US technology giants: Report

By Waqas

This can be one of one of the largest corporate spying and hardware hacking campaigns ever launched by a nation-state. Bloomberg has revealed in its recently published report that a nation-state has launched a significant supply chain attack. It is believed to be one of the largest corporate spying and hardware hacking campaigns ever launched […]

This is a post from HackRead.com Read the original post: Chinese surveillance chips found in servers used by US technology giants: Report

Surveillance Amazon Apple China Hacking Privacy Spying
2018-10-04 16:10:00 UTC
ThreatPost
ThreatPost
Apple, Amazon Strongly Refute Server Infiltration Report

An explosive Bloomberg report, if true, would highlight the largest supply chain attack to have been launched against American corporations.

Government Hacks Amazon Apple China China Spies Espionage Super Micro Supply Chain
2018-10-04 16:08:00 UTC
Ars Technica
Ars Technica
Bloomberg: Super Micro motherboards used by Apple, Amazon contained Chinese spy chips

Super Micro, Amazon, and Apple deny everything in the report.

Policy Tech Amazon Apple China Hack Hardware Motherboards Pla Security Supermicro
2018-10-04 15:30:00 UTC
Dark Reading
Dark Reading
For $14.71, You Can Buy A Passport Scan on the Dark Web

That's the average price of a digital passport scan, and it goes up with proof of identification, a new study finds.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
20 May 2024
BREACHAWARE HQ

A total of 25 breaches were found and analysed resulting in 61,491,599 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included The Post Millennial, Share This, Book 24, Stealer Log 0457 and Stealer Log 0459