Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Infosec News Feed

An aggregated list of cybersecurity publications
2023-01-24 18:00:00 UTC
Dark Reading
Dark Reading
Chat Cybersecurity: AI Promises a Lot, But Can It Deliver?

Machine learning offers great opportunities, but it still can't replace human experts.

2023-01-24 18:00:00 UTC
Dark Reading
Dark Reading
Chat Cybersecurity: AI Promises a Lot, but Can It Deliver?

Machine learning offers great opportunities, but it still can't replace human experts.

2023-01-24 17:22:00 UTC
Dark Reading
Dark Reading
'DragonSpark' Malware: East Asian Cyberattackers Create an OSS Frankenstein

Hackers cleverly cobbled together a suite of open source software — including a novel RAT — and hijacked servers owned by ordinary businesses.

2023-01-24 15:59:00 UTC
Dark Reading
Dark Reading
Microsoft to Block Excel Add-ins to Stop Office Exploits

The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code.

2023-01-24 15:00:00 UTC
Dark Reading
Dark Reading
Security and the Electric Vehicle Charging Infrastructure

When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty.

2023-01-24 13:22:00 UTC
The Daily Swig
The Daily Swig
IoT vendors faulted for slow progress in setting up vulnerability disclosure programs

Manufacturer complacency ‘translates into an unacceptable risk for consumers’, warns security expert

2023-01-24 12:41:00 UTC
HackRead
HackRead
6 of the Best Crypto Bug Bounty Programs

By Waqas

Crypto bug bounty programs have become essential as the number of blockchain platforms grows exponentially, making it increasingly difficult for developers to keep up with all the necessary security protocols on their own.

This is a post from HackRead.com Read the original post: 6 of the Best Crypto Bug Bounty Programs

Cryptocurrency Security Bitcoin Bug Bounty Crypto Cyber Attack Security Vulnerability
2023-01-24 01:24:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Apple patches are out – old iPhones get an old zero-day fix at last!

Don't delay, especially if you're still running an iOS 12 device... please do it today!

Apple Vulnerability CVE-2022-42856 Exploit Ios Ios 12 IPadOS MacOS Ventura Zero Day
2023-01-23 23:29:00 UTC
Dark Reading
Dark Reading
Wallarm Aims to Reduce the Harm From Compromised APIs

API Leak Management software discovers exposed API keys and other secrets, blocks their use, and monitors for abuse, the company says.

2023-01-23 22:00:00 UTC
Dark Reading
Dark Reading
Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access

Devices running Android 12 and below are at risk of attackers downloading apps that direct users to a malicious domain.