Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2024-09-05 09:00:00 UTC
Naked Security | Sophos
Naked Security | Sophos
The SEC’s 2023 final rules on cybersecurity disclosures

As part of its mission to protect investors and maintain efficient markets, the US Securities and Exchange Commission (SEC) released a new set of final rules[1] on July 26, 2023, which changed how publicly traded companies in the U.S. must disclose information about cybersecurity risks, governance, and incidents. Specifically, the new rules require “disclosure of […]

Products & Services Compliance SEC Solutions
2024-09-05 07:00:00 UTC
Ars Technica
Ars Technica
FTC urged to make smart devices say how long they will be supported

Sudden subscription fees, lost features causing users "death by a thousand cuts."

Policy Tech FTC Smart Home
2024-09-05 04:01:00 UTC
Dark Reading
Dark Reading
Indian Army Propaganda Spread by 1.4K AI-Powered Social Media Accounts

For three years now, more than a thousand social media accounts have been reposting the same pro-India, anti-Pakistan content on Facebook and X.

2024-09-05 00:25:00 UTC
Ars Technica
Ars Technica
The Vega rocket never found its commercial niche. After tonight, it’s gone.

The larger Vega-C will take over, primarily to launch European government satellites.

Science Space Arianespace Avio Copernicus European Space Agency Launch Sentinel Vega
2024-09-04 23:29:00 UTC
HackRead
HackRead
New Supply Chain Attack “Revival Hijack” Risks Massive PyPI Takeovers

JFrog's cybersecurity researchers have identified a new PyPI attack technique called "Revival Hijack," which exploits package deletion policies. Over 22,000 packages are at risk, potentially impacting thousands of users. Stay informed!

Security Cyber Attacks Cyber Attack Cybersecurity PyPI Python Revival Hijack Supply Chain Attack Vulnerability
2024-09-04 22:01:00 UTC
Ars Technica
Ars Technica
After Starliner, NASA has another big human spaceflight decision to make

"We still have a lot of work to do to close out the heat shield investigation.”

Science Space
2024-09-04 21:38:00 UTC
Ars Technica
Ars Technica
Generative AI backlash hits annual writing event, prompting resignations

NaNoWriMo refuses to condemn AI as accessibility tool, faces criticism from writers.

AI Biz & IT AI Accessibility AI And Disabilities Annual Writing Event ChatGPT Chatgtp Chuck Wendig Claire Silver FAQ Machine Learning NaNoWriMo No Novel November
2024-09-04 21:34:00 UTC
Dark Reading
Dark Reading
White House Unveils Roadmap to Fix BGP

The White House Office of the National Cyber Director released a plan outlining steps network operators and service providers need to take to secure BGP from abuse and configuration errors.

2024-09-04 21:34:00 UTC
Dark Reading
Dark Reading
White House Unveils Road Map to Fix BGP

The White House Office of the National Cyber Director released a plan outlining steps network operators and service providers need to take to secure BGP from abuse and configuration errors.

2024-09-04 21:13:00 UTC
Ars Technica
Ars Technica
Internet Archive’s e-book lending is not fair use, appeals court rules

Publishers prevail despite lack of proof of market harm.

Policy Copyright Law Ebooks Fair Use Internet Archive Online Library

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES