Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-09-10 21:55:00 UTC
Dark Reading
Dark Reading
US Sanctions Russian Attackers for 2020 Election Interference

The move comes as Microsoft publishes research on attack groups and activity attempting to target the Biden and Trump campaigns.

2020-09-10 20:57:00 UTC
ThreatPost
ThreatPost
Microsoft Warns of Cyberattacks on Trump, Biden Election Campaigns

Just months before the U.S. presidential election, hackers from Russia, China and Iran are ramping up phishing and malware attacks against campaign staffers.

Government Hacks Web Security Apt APT 28 Charming Kitten China Cyberattack Donald Trump Election Meddling Irán Joe Biden Microsoft Nation-state Attacks Phishing Attack Phosphorous Russia Spear Phishing Strontium U.S. Election Security U.S. Elections U.S. Presidential Election Zirconium
2020-09-10 20:50:00 UTC
ThreatPost
ThreatPost
Razer Gaming Fans Caught Up in Data Leak

A cloud misconfiguration at the gaming-gear merchant potentially exposed 100,000 customers to phishing and fraud.

Breach Cloud Security Web Security $100 000 Bob Diachenko Breach Cloud Misconfiguration Customer Data Data Leak Elastricsearch Exposure Fraud Gaming Gear Personal Information Phishing Razer
2020-09-10 18:00:00 UTC
Dark Reading
Dark Reading
Managed IT Providers: The Cyber-Threat Actors' Gateway to SMBs

Criminals have made MSPs a big target of their attacks. That should concern small and midsize businesses a great deal.

2020-09-10 17:41:00 UTC
HackRead
HackRead
BLURtooth vulnerability exposes devices to MITM attack

By Sudais Asif

The attacks carried out by exploiting BLURtooth vulnerability are being referred to as the BLUR attacks.

This is a post from HackRead.com Read the original post: BLURtooth vulnerability exposes devices to MITM attack

Security Bluetooth BLURtooth Hacking MITM Vulnerability
2020-09-10 16:39:00 UTC
ThreatPost
ThreatPost
Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks

The "BLURtooth" flaw allows attackers within wireless range to bypass authentication keys and snoop on devices utilizing implementations of Bluetooth 4.0 through 5.0.

Vulnerabilities Web Security Authentication Keys Bluetooth Bluetooth 4.0 Bluetooth 5.0 Bluetooth Classic Bluetooth Low Energy BLURtooth Cross-Transport Key Derivation CVE-2020-15802 Man-in-the-middle Attacks MitM
2020-09-10 16:18:00 UTC
The Daily Swig
The Daily Swig
Difficult-to-execute attack could break TLS encryption in rare circumstances

The implications of ‘Raccoon’ are dangerous, but the real-world threat is minor

2020-09-10 15:52:00 UTC
HackRead
HackRead
Attackers use legitimate tool to compromise Cloud based assets

By Sudais Asif

While the Cloud offers an excellent chance for firms to host their web services online, it comes with its fair share of disadvantages as well.

This is a post from HackRead.com Read the original post: Attackers use legitimate tool to compromise Cloud based assets

Cyber Attacks Security Cloud Cyber Security Security
2020-09-10 14:32:00 UTC
The Daily Swig
The Daily Swig
The top 10 best hacker-themed books of all time

Page turners and pwnage

2020-09-10 14:09:00 UTC
ThreatPost
ThreatPost
Ransomware And Zoom-Bombing: Cyberattacks Disrupt Back-to-School Plans

Cyberattacks have caused several school systems to delay students' first day back - and experts warn that new COVID-related delays could be the new "snow days."

Critical Infrastructure Featured Government Hacks Malware Vulnerabilities Web Security Back To School Clark County Coronavirus COVID-19 Cyberattack Delay Education First Day Of School Hartford Hrtford Las Vegas Phishing Public Schools Ransomware Remote Learning School System Zoom Zoom-bombing

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
February 2024
By SUE DENIM
The Truth Behind "The Xun" Repository Bombshell.
Well, well, well, it seems the digital waters are getting murkier by the day. A mysterious GitHub user by the name of I-SOON recently made their grand entrance onto the coding scene, dropping a repository bombshell titled "The Truth Behind an Xun." Inside? Oh, just a casual 200 megabytes of top-secret intel about a Chinese cybersecurity company. Talk about spilling the digital tea!

This treasur...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
25 March 2024
BREACHAWARE HQ

A total of 24 breaches were found and analysed resulting in 87,916,303 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included AT&T Division, US Consumer Opt In Records, Gosuslugi [2], Kava CasinoLife Poker and Stealer Log 0438