Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-08-15 19:40:00 UTC
HackRead
HackRead
US claims disrupting 3 cryptocurrency campaigns run by terror groups

By Sudais Asif

A total of 300 cryptocurrency accounts, 4 websites, and 4 Facebook pages with...

This is a post from HackRead.com Read the original post: US claims disrupting 3 cryptocurrency campaigns run by terror groups

Cyber Crime Bitcoin Cryptocurrency Security Terrorism
2020-08-15 12:32:00 UTC
HackRead
HackRead
XCSSET Malware targets macOS by infecting Xcode developer projects

By Zara Khan

The entry point of XCSSET malware is still unknown to researchers.

This is a post from HackRead.com Read the original post: XCSSET Malware targets macOS by infecting Xcode developer projects

Malware Security Apple MacOS TROJAN UXSS XCSSET
2020-08-14 22:07:00 UTC
HackRead
HackRead
New attack vector ReVoLTE lets hackers monitor phone calls

By Sudais Asif

New attack vector ReVoLTE breaks the encryption on VoLTE calls.

This is a post from HackRead.com Read the original post: New attack vector ReVoLTE lets hackers monitor phone calls

Privacy Surveillance LTE ReVoLTE Security Vulnerability
2020-08-14 21:20:00 UTC
ThreatPost
ThreatPost
PoC Exploit Targeting Apache Struts Surfaces on GitHub

Researchers have discovered freely available PoC code and exploit that can be used to attack unpatched security holes in Apache Struts 2.

Hacks Vulnerabilities Web Security Apache Struts 2 Apache Struts Security Team CVE-2019-0230 CVE-2019-0233 DoS Github Object-Graph Navigation Language OGNL Poc Proof-of-Concept
2020-08-14 20:50:00 UTC
Dark Reading
Dark Reading
Research Casts Doubt on Value of Threat Intel Feeds

Two commercial threat intelligence services and four open source feeds rarely provide the same information, raising questions about how security teams should gauge their utility.

2020-08-14 20:45:00 UTC
Dark Reading
Dark Reading
IcedID Shows Obfuscation Sophistication in New Campaign

The malware's developers have turned to dynamic link libraries (DLLs) to hide their work.

2020-08-14 20:25:00 UTC
Dark Reading
Dark Reading
DHS CISA Warns of Phishing Emails Rigged with KONNI Malware

Konni is a remote administration tool cyberattackers use to steal files, capture keystrokes, take screenshots, and execute malicious code.

2020-08-14 20:18:00 UTC
ThreatPost
ThreatPost
Mac Users Targeted by Spyware Spreading via Xcode Projects

The XCSSET suite of malware also hijacks browsers, has a ransomware module and more -- and uses a pair of zero-day exploits.

Malware Vulnerabilities Web Security Browser Hijack Cookies Developer Projects Fake App Mac Mach-o MacOS Malware Ransomware Spyware Trend Micro Xcode Projects Xcsset Zero Day Exploits
2020-08-14 18:56:00 UTC
Krebs on Security
Krebs on Security
Medical Debt Collection Firm R1 RCM Hit in Ransomware Attack

R1 RCM Inc. [NASDAQ:RCM], one of the nation's largest medical debt collection companies, has been hit in a ransomware attack. 

Ransomware Accretive Health Defray Ransomware Proofpoint R1 RCM Ransomware Trend Micro
2020-08-14 18:26:00 UTC
ThreatPost
ThreatPost
Critical Flaws in WordPress Quiz Plugin Allow Site Takeover

The recently patched flaws could be abused by an unauthenticated, remote attackers to take over vulnerable websites.

Web Security Critical Flaws Fix Patch Plugin Quiz And Survey Master Wordpress

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
March 2024
By SUE DENIM
TikTok Ban, Discord Bot Community Attack, and Telecom Company's Breach Resurgence.
Ah, the dramatic saga of TikTok in the United States! Picture this: a ban looming over TikTok, akin to a dark cloud threatening to rain on our digital parade. Congress is all up in arms, waving their "think of the children" banners while TikTok nervously checks its watch, wondering if it should start packing its bags for a forced sale. Meanwhile, nobody bats an eye at the plethora of Chinese gadge...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
15 April 2024
BREACHAWARE HQ

A total of 15 breaches were found and analysed resulting in 10,110,194 leaked accounts containing a total of 23 different data types. The breaches found publicly and freely available included US Environmental Protection Agency (EPA), Stealer Log 0448, Stealer Log 0449, Believe and Carding Team