Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-08-09 17:08:00 UTC
Ars Technica
Ars Technica
Windows 10 to get disposable sandboxes for dodgy apps

Apps will be run in a virtual machine that's discarded after use.

Staff Hyper-V Microsoft Sandbox Security Virtualization Windows
2018-08-02 22:08:00 UTC
Ars Technica
Ars Technica
Heads-up: 2FA provider Duo Security to be acquired by Cisco (ugh)

Both companies insist nothing will change, but this former Cisco customer has doubts.

Biz & IT Cisco Cisco Systems Duo Duo Security Internet Security Security
2018-07-26 21:40:00 UTC
Ars Technica
Ars Technica
New Spectre attack enables secrets to be leaked over a network

It's no longer necessary to run attacker code on the victim system.

Tech AMD ARM Intel Meltdown Network Processors Security Side Channel Spectre Speculative Execution
2018-07-12 22:06:00 UTC
Ars Technica
Ars Technica
Microsoft offers extended support for Windows, SQL 2008—but with a catch

An extra three years of patches are being offered to in-cloud users.

Tech Microsoft Security SQL Server SQL Server 2008 Support Updates Windows Server Windows Server 2008 Windows Server 2008 R2
2018-07-10 21:00:00 UTC
Ars Technica
Ars Technica
New Spectre-like attack uses speculative execution to overflow buffers

Research is continuing to find new attack vectors.

Tech AMD ARM Intel Meltdown Processors Security Spectre Speculative Execution
2018-06-25 22:18:00 UTC
Ars Technica
Ars Technica
Hyperthreading under scrutiny with new TLBleed crypto key leak

A new attack prompted OpenBSD's developers to disable hyperthreading by default.

Tech Intel OpenBSD Processors Security
2018-06-05 00:10:00 UTC
Ars Technica
Ars Technica
A host of new security enhancements is coming to iOS and macOS

Coming: FaceTime encryption, protected cam access, and, possibly, USB Restricted Mode.

Biz & IT Apple IOS IPhones MacOS Macs Privacy Security WWDC
2018-05-22 16:24:00 UTC
Ars Technica
Ars Technica
New speculative-execution vulnerability strikes AMD, ARM, and Intel

Fortunately, existing fixes should provide the protection we need.

Tech Meltdown Processors Security Spectre SSB
2018-05-17 18:46:00 UTC
Ars Technica
Ars Technica
As the Web moves toward HTTPS by default, Chrome will remove “secure” indicator

The browser is changing to flag the things that are dangerous, not the ones that are safe.

Tech Browsers Chrome HTTP HTTPS Security Web
2018-04-18 15:12:00 UTC
Ars Technica
Ars Technica
Microsoft claims to make Chrome safer with new extension

A purported Edge advantage is now available in Chrome.

Tech Browsers Chrome Microsoft Security Windows

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
20 May 2024
BREACHAWARE HQ

A total of 25 breaches were found and analysed resulting in 61,491,599 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included The Post Millennial, Share This, Book 24, Stealer Log 0457 and Stealer Log 0459