Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

BreachAware Dashboard

Accessed on Friday, 22-Feb-2019 02:33:54 UTC from IP address
Follow BreachAware

Perform Quick Domain Scan

Strict Use Policy: Prevention and detection of crime; as part of a system of risk management.

Realtime Feed

Realtime data discovered by the BreachAware platform in the last 5 minutes

Autodiscovered Credentials

Data discovered by the BreachAware platform in the last week

Scan Activity

Scan audit log

Login to view activity

Account Activity

Account Audit Log

Login to view activity

Infosec News Feed

An aggregated list of cybersecurity publications
2019-02-22 01:19:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Bluetooth “gas station” warning on Facebook – truth or hoax? [VIDEO]

Can your phone reliably detect card skimmers using Bluetooth alone? Find out in the latest Naked Security Live video...

Data Loss Video Bluetooth Cybercrime Facebook Live Fraud Naked Security Live Skimming
2019-02-21 23:30:00 UTC
Dark Reading
Dark Reading
Researchers Propose New Approach to Address Online Password-Guessing Attacks

Recommended best practices not effective against certain types of attacks, they say.

2019-02-21 22:50:00 UTC
Dark Reading
Dark Reading
Attack Campaign Experiments with Rapid Changes in Email Lure Content

It's like polymorphic behavior - only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content.

2019-02-21 20:10:00 UTC
Understanding VPN through open systems interconnection model

By David Balaban

VPN is a wonderful thing that you all have probably heard about. I assume it was something like this: “Using a VPN you can visit websites blocked by state services and engage in any network activity without fear of revealing your actual IP address.” If you thought that Virtual Private Network is a magic tool […]

This is a post from Read the original post: Understanding VPN through open systems interconnection model

Leaks Privacy Security Surveillance Anonymity Checksum Data LEAKS Network Network Protocol OSI Model Packet Security Surviellence VPN
2019-02-21 19:30:00 UTC
Dark Reading
Dark Reading
Why Cybersecurity Burnout Is Real (and What to Do About It)

The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.

2019-02-21 19:01:00 UTC
ThreatList: Porn-Focused Malware Triples, Dark Web Loves It

Premium-access credentials to porn sites are hot in the cyber-underground, as credential-harvesting malware proliferates.

Malware Mobile Security Most Recent ThreatLists Privacy Web Security Fake Sites For Sale On Dark Web Kaspersky Lab Malware Phishing Porn Pornhub Premium Site Credentials The Report
2019-02-21 18:20:00 UTC
Dark Reading
Dark Reading
Cyber Extortionists Can Earn $360,000 a Year

Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up.

2019-02-21 17:05:00 UTC
Adobe Re-Patches Critical Acrobat Reader Flaw

Adobe has issued yet another patch for a critical vulnerability in its Acrobat Reader - a week after the original fix.

Vulnerabilities Abode Flaw Acrobat Reader Adobe Adobe Patch Critical Vulnerability Security Update Zero Day
2019-02-21 16:08:00 UTC
The Daily Swig
The Daily Swig
‘Everybody has sharpened up’ – Australia’s breach notification law, one year on

Australia’s breach notification legislation is forcing organizations to think more seriously about security

2019-02-21 15:54:00 UTC
Highly Critical Drupal RCE Flaw Affects Millions of Websites

Admins should update immediately to fix a remote code-execution vulnerability.

Vulnerabilities Web Security CMS Drupal Highly Critical Flaw Millions Of Websites Open Source Update Vulnerability