Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-08-02 22:08:00 UTC
Ars Technica
Ars Technica
Heads-up: 2FA provider Duo Security to be acquired by Cisco (ugh)

Both companies insist nothing will change, but this former Cisco customer has doubts.

Biz & IT Cisco Cisco Systems Duo Duo Security Internet Security Security
2018-07-26 21:40:00 UTC
Ars Technica
Ars Technica
New Spectre attack enables secrets to be leaked over a network

It's no longer necessary to run attacker code on the victim system.

Tech AMD ARM Intel Meltdown Network Processors Security Side Channel Spectre Speculative Execution
2018-07-12 22:06:00 UTC
Ars Technica
Ars Technica
Microsoft offers extended support for Windows, SQL 2008—but with a catch

An extra three years of patches are being offered to in-cloud users.

Tech Microsoft Security SQL Server SQL Server 2008 Support Updates Windows Server Windows Server 2008 Windows Server 2008 R2
2018-07-10 21:00:00 UTC
Ars Technica
Ars Technica
New Spectre-like attack uses speculative execution to overflow buffers

Research is continuing to find new attack vectors.

Tech AMD ARM Intel Meltdown Processors Security Spectre Speculative Execution
2018-06-25 22:18:00 UTC
Ars Technica
Ars Technica
Hyperthreading under scrutiny with new TLBleed crypto key leak

A new attack prompted OpenBSD's developers to disable hyperthreading by default.

Tech Intel OpenBSD Processors Security
2018-06-05 00:10:00 UTC
Ars Technica
Ars Technica
A host of new security enhancements is coming to iOS and macOS

Coming: FaceTime encryption, protected cam access, and, possibly, USB Restricted Mode.

Biz & IT Apple IOS IPhones MacOS Macs Privacy Security WWDC
2018-05-22 16:24:00 UTC
Ars Technica
Ars Technica
New speculative-execution vulnerability strikes AMD, ARM, and Intel

Fortunately, existing fixes should provide the protection we need.

Tech Meltdown Processors Security Spectre SSB
2018-05-17 18:46:00 UTC
Ars Technica
Ars Technica
As the Web moves toward HTTPS by default, Chrome will remove “secure” indicator

The browser is changing to flag the things that are dangerous, not the ones that are safe.

Tech Browsers Chrome HTTP HTTPS Security Web
2018-04-18 15:12:00 UTC
Ars Technica
Ars Technica
Microsoft claims to make Chrome safer with new extension

A purported Edge advantage is now available in Chrome.

Tech Browsers Chrome Microsoft Security Windows
2018-04-17 03:00:00 UTC
Ars Technica
Ars Technica
Intel, Microsoft to use GPU to scan memory for malware

The company is also using its processors’ performance monitoring to detect malicious code.

Tech Intel Malware Microsoft Security

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451