Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-09-05 14:04:00 UTC
Ars Technica
Ars Technica
Google wants to get rid of URLs but doesn’t know what to use instead

Their complexity makes them a security hazard; their ubiquity makes replacement nigh impossible.

Tech Browsers Google Security Urls Web
2018-09-04 17:22:00 UTC
Krebs on Security
Krebs on Security
For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

mSpy, the makers of a software-as-a-service product that claims to help more than a million paying customers spy on the mobile devices of their kids and partners, has leaked millions of sensitive records online, including passwords, call logs, text messages, contacts, notes and location data secretly collected from phones running the stealthy spyware.

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy's site and for mobile phone data collected by mSpy's software. The database required no authentication.

Data Breaches Apple ICloud BBC Facebook IPhone MSpy Breach Nitish Shah WhatsApp
2018-09-04 15:27:00 UTC
The Daily Swig
The Daily Swig
Access denied: How are the big tech players protecting our digital rights?

The world’s major tech companies have similar policies in handling our online accounts, even under threat of law or after our death.

2018-09-04 10:57:00 UTC
The Daily Swig
The Daily Swig
Bad ads: Google clamps down on tech support scammers

Search giant working on verification program for legitimate providers.

2018-09-03 15:20:00 UTC
The Daily Swig
The Daily Swig
Hackers of the world unite at EMF 2018

2,500 like-minded people descend on South West England to ‘hack the planet’.

2018-09-03 02:31:00 UTC
Krebs on Security
Krebs on Security
Alleged ‘Satori’ IoT Botnet Operator Sought Media Spotlight, Got Indicted

A 20-year-old from Vancouver, Washington was indicted last week on federal hacking charges and for allegedly operating the "Satori" botnet, a malware strain unleashed last year that infected hundreds of thousands of wireless routers and other "Internet of Things" (IoT) devices. This outcome is hardly surprising given that the accused's alleged alter ego has been relentless in seeking media attention for this global crime machine.

Ne'er-Do-Well News 9gigs_proxypipe Bad Packets LLC Daily Beast Ddos-for-hire Kenneth Schuchman Kenny.windwmx79@outlook.com Kevin Poulsen Mirai Nexus Zeta Nexuszeta1337@gmail.com Ogmemes123@jabber.ru Paras Jha ProxyPipe Robert Coelho Satori Botnet Author Stresser Troy Mursch Zetastress
2018-08-29 16:18:00 UTC
Ars Technica
Ars Technica
Microsoft obliquely acknowledges Windows 0-day bug published on Twitter

Flaw allows a local user to obtain System privileges.

Tech 0-Day Microsoft Privilege Escalation Security Windows
2018-08-27 13:00:00 UTC
Ars Technica
Ars Technica
The adventures of lab ED011—“Nobody would be able to duplicate what happened there”

One Romanian campus computer lab both pentested the world and eventually helped protect it.

Features Tech Features Hacking Romania Security
2018-08-21 17:26:00 UTC
Ars Technica
Ars Technica
Chrome 69 will take the next step to killing Flash, roll out new design

Flash will have to be enabled every time a site tries to use it.

Tech Browsers Chrome Design Flash Material Security User Interface
2018-08-14 19:18:00 UTC
Ars Technica
Ars Technica
Intel’s SGX blown wide open by, you guessed it, a speculative execution attack

Speculative execution attacks truly are the gift that keeps on giving.

Tech Encryption Intel Meltdown Programming Security Sgx Spectre X86

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
13 May 2024
BREACHAWARE HQ

A total of 35 breaches were found and analysed resulting in 4,063,408 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included ESN, Stealer Log 0456, SVR Labs, Kuchenland and Stealer Log 0455