Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-09-28 16:09:00 UTC
HackRead
HackRead
Demonoid goes offline with owner missing in action for last two months

By Waqas

It has been many days since a popular, semi-private BitTorrent tracker Demonoid has remained offline. The employees working for this website are also clueless about what’s happening and claim that the owner of Demonoid, Deimos, is also missing. None of them have had any contact with him for the past two months. Demonoid has been […]

This is a post from HackRead.com Read the original post: Demonoid goes offline with owner missing in action for last two months

Technology News BitTorrent Demonoid Downloads Movies Piracy Technology Torrent
2018-09-28 15:30:00 UTC
The Daily Swig
The Daily Swig
Port of San Diego remains open as ransomware investigation continues

The cargo port is the latest US authority to be targeted by malicious hackers.

2018-09-28 14:30:00 UTC
Dark Reading
Dark Reading
How Data Security Improves When You Engage Employees in the Process

When it comes to protecting information, we can all do better. But encouraging a can-do attitude goes a long way toward discouraging users' risky behaviors.

2018-09-28 13:37:00 UTC
The Daily Swig
The Daily Swig
‘This is now the largest data breach settlement on record’

Top infosec trends in the social media spotlight this week.

2018-09-28 13:22:00 UTC
ThreatPost
ThreatPost
Android App Verification Issues Pave Way For Phishing Attacks

A research team suggested a new secure-by-design API after discovering design flaws in the way Android apps are verified by password managers.

Hacks Mobile Security 1Password Android App Ashland Credential Leak Google Instant App Keeper LastPass Password Manager
2018-09-28 12:00:00 UTC
Dark Reading
Dark Reading
7 Most Prevalent Phishing Subject Lines

The most popular subject lines crafted to trick targets into opening malicious messages, gleaned from thousands of phishing emails.

2018-09-28 09:01:00 UTC
The Daily Swig
The Daily Swig
Password bug in cloud storage products allowed hackers remote access

Western Digital releases a hotfix one year after the vulnerability was discovered.

2018-09-27 22:45:00 UTC
Dark Reading
Dark Reading
Ransomware Attack Hits Port of San Diego

The attack began Monday and continues to have an impact on services at the port.

2018-09-27 21:26:00 UTC
Ars Technica
Ars Technica
Google backtracks—a bit—on controversial Chrome sign-in feature

Privacy-conscious users were unhappy at being signed in to browser without consent.

Tech Browsers Chrome Google Privacy Security Software Web
2018-09-27 20:47:00 UTC
ThreatPost
ThreatPost
Perimeter Defenses are Dead, So Now What?

Over time, both enterprise and government networks have seen the network perimeter blur uncontrollably.

InfoSec Insider Perimeter Defenses Salesforce Marketing Cloud Zero Trust

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
06 May 2024
BREACHAWARE HQ

A total of 19 breaches were found and analysed resulting in 6,573,110 leaked accounts containing a total of 22 different data types. The breaches found publicly and freely available included Rendez-Vous, Stealer Log 0454, boAt Lifestyle, Expandia and Intergroup Gold