BreachAware Dashboard

Accessed on Tuesday, 23-Oct-2018 11:48:15 UTC from IP address
Follow BreachAware

Perform Quick Domain Scan

Strict Use Policy: Prevention and detection of crime; as part of a system of risk management.

Realtime Feed

Realtime data discovered by the BreachAware platform in the last 5 minutes

Autodiscovered Credentials

Data discovered by the BreachAware platform in the last week

Scan Activity

Scan audit log

Login to view activity

Account Activity

Account Audit Log

Login to view activity

Infosec News Feed

An aggregated list of cybersecurity publications
2018-10-23 08:52:00 UTC
The Daily Swig
The Daily Swig
Firmware zero-day leaves 2m storage devices open to RCE

NAS security flaws impact devices from Netgear, Seagate, Medion, and Western Digital.

2018-10-22 20:30:00 UTC
Dark Reading
Dark Reading
US Tops Global Malware C2 Distribution

The United States hosts 35% of the world's command-and-control infrastructure, driving the frequency of host compromises.

2018-10-22 19:55:00 UTC
Krebs on Security
Krebs on Security
Who Is Agent Tesla?

A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity -- attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malware's apparent creator seems to have done little to hide his real-life identity.

A Little Sunshine Breadcrumbs Agent Tesla Colton Grubbs Discord Lastline LuminosityLink Memorial Healthcare Group Microsoft Office Mustafa Can Ozaydin NanoCore RAT
2018-10-22 18:00:00 UTC
Dark Reading
Dark Reading FFE Breach Compromises 75K Users' Data

Attackers broke into a sign-up system used by healthcare insurance agents and brokers to help consumers apply for coverage.

2018-10-22 15:52:00 UTC
The Danger and Opportunity in 5G Connectivity and IoT

The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world.

Critical Infrastructure InfoSec Insider Mobile Security 5G Device Security Encryption Identity Management Infosec Insider Internet Of Things IoT Ixia Multifactor Authentication Sensor Networks Steve Mcgregory
2018-10-22 15:41:00 UTC
Obamacare Sign-Up Channel Breach Affects 75K Consumers

A hack targeted the Direct Enrollment pathway, which allows insurance agents and brokers to help consumers sign up for Affordable Care Act coverage.

Breach Government Hacks Privacy 75000 Consumers 75K Consumers Affordable Care Act Data Breach Direct Enrollment Pathway Hack Insurance Broker Obamacare
2018-10-22 14:47:00 UTC
Personal data of 75,000 individuals exposed after system hack

By Waqas

Centers for Medicare and Medicaid Services (CMS) experienced a data breach leading to exposure of highly sensitive personal data of nearly 75,000 people. The CMS is a government system linked with which assists insurance agents and brokers in helping people register for its healthcare plans. An announcement was made late Friday by the CMS […]

This is a post from Read the original post: Personal data of 75,000 individuals exposed after system hack

Hacking News Breach Hacking Health Care Medical Privacy Security USA
2018-10-22 14:41:00 UTC
Critical Bug Impacts Live555 Media Streaming Libraries

A critical streaming bug impacts Live Networks LIVE555 RTSPServer, but not the popular VLC and MPLayer client-side software.

Hacks Vulnerabilities CVE-2018-4013 LIVE555 MPLayer RCE Bug Real Time Streaming Protocol RTSP VLC Media Player
2018-10-22 14:09:00 UTC
The Daily Swig
The Daily Swig
Millennials are falling victim to tech support scams

Half of the UK’s young people have lost money to fraudulent support agents.

2018-10-22 11:57:00 UTC
How to Choose the Most Secure Software for your Business

By Carolina

When it comes to protecting your business, how do you choose the best available and secure software on the market? Security software is a key component in ensuring your business is protected from hacking, viruses, risky emails and many other scams. There are plenty of options available; from basic packages that are free of charge, […]

This is a post from Read the original post: How to Choose the Most Secure Software for your Business

Security Business ECommerce Hacking Malware Security Software Technology