Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSRenewed calls for social media security amid false alert fears.
Microsoft this week released software updates to fix roughly 50 security problems with various versions of its Windows operating system and related software, including one flaw that is already being exploited and another for which exploit code is publicly available.
Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.
Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.
This is the second local privilege-escalation zero-day this APT group has exploited.
Gallmaker group is relying exclusively on legitimate tools and living-off-the-land tactics to make detection very difficult.
But two law firms are investigating whether the security vendor breached its fiduciary duty to shareholders by not actively seeking buyers offering a higher price.
A brand-new approach to harvesting credentials hinges on users' lack of cloud savvy.
Time to upskill the underrepresented.
Bots are a known problem, but researchers will tell you that bot defenses create problems of their own when it comes to valuable data.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.