Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSThis month's Patch Tuesday includes 49 patches, two of which are ranked Critical, and two security advisories.
New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants.
This year's Virus Bulletin conference featured top-tier research from some of the world's best threat intelligence experts.
By ensuring that each layer of protection scours an application for unintended uses, you can find the flaws before the bad guys do.
GAO report outlines challenges for the US Department of Defense to handle security flaws in weapon systems.
By Waqas
Tenable Research’s cybersecurity researcher has released “By The way,” which is a new PoC (proof-of-concept) RCE attack after identifying a new attack method to exploit an already discovered vulnerability in MikroTik routers. The vulnerability, identified as CVE-2018-14847, is an old directory traversal flaw, which was patched the same day it was detected in April, 2018. […]
This is a post from HackRead.com Read the original post: MikroTik router vulnerability lets hackers bypass firewall to load malware undetected
Cloud computing is creating new challenges among security professionals as attackers embrace the "as-a-service model", giving unsophisticated cybercriminals a leg up in carrying out attacks.
Google was caught not disclosing a potential data breach -- leaving questions as to whether a lack of transparency is the new normal.
Most of the attacks originated in China.
Louisiana Congressman Cedric Richmond calls for an end to intra-agency “turf wars” over cybersecurity responsibility.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.