Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Infosec News Feed

An aggregated list of cybersecurity publications
2018-09-21 16:31:00 UTC
Krebs on Security
Krebs on Security
Credit Freezes are Free: Let the Ice Age Begin

It is now free in every U.S. state to freeze and unfreeze your credit file and that of your dependents, a process that blocks identity thieves and others from looking at private details in your consumer credit history. If you've been holding out because you're not particularly worried about ID theft, here's another reason to reconsider: The credit bureaus profit from selling copies of your file to others, so freezing your file also lets you deny these dinosaurs a valuable revenue stream.

A Little Sunshine Security Tools Annualcreditreport.com ChexSystems Credit Freeze Credit Lock Credit Monitoring CreditKarma Equifax Experian Innovis NCTUE Optoutprescreen.com Security Freeze TransUnion
2018-09-21 15:30:00 UTC
Dark Reading
Dark Reading
US Approves Cyber Weapons Against Foreign Enemies

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

2018-09-21 15:19:00 UTC
The Daily Swig
The Daily Swig
‘This is a significant breakthrough in computer science’

Top infosec trends in the media spotlight this week.

2018-09-21 15:09:00 UTC
ThreatPost
ThreatPost
Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution

Microsoft said that it's working on a fix for a zero-day flaw in its JET Database Engine.

Vulnerabilities Web Security Flaw Jet Database Engine Micropatch Microsoft Remote Code Execution Unpatched Vulnerability Zero-day
2018-09-21 14:30:00 UTC
Dark Reading
Dark Reading
Data Manipulation: How Security Pros Can Respond to an Emerging Threat

Industry leaders are scrambling to address the issue, which will take new thinking to overcome.

2018-09-20 21:50:00 UTC
Dark Reading
Dark Reading
Think Like An Attacker: How a Red Team Operates

Seasoned red teamers explain the value-add of a red team, how it operates, and how to maximize its effectiveness.

2018-09-20 21:20:00 UTC
Dark Reading
Dark Reading
Retail Sector Second-Worst Performer on Application Security

A "point-in-time" approach to PCI compliance could be one reason why so many retailers appear to be having a hard time.

2018-09-20 21:07:00 UTC
ThreatPost
ThreatPost
Lucy Gang Debuts with Unusual Android MaaS Package

The threat actor's Android-focused cyber-arms package, dubbed Black Rose Lucy, is limited in reach for now, but clearly has global ambitions.

Malware Mobile Security Android Phones Black Rose Lucy Botnet Cyberattacks Global Ambitions Lucy Gang Malware As A Service
2018-09-20 20:15:00 UTC
Dark Reading
Dark Reading
Account Takeover Attacks Become a Phishing Fave

More than three-quarters of ATOs resulted in a phishing email, a new report shows.

2018-09-20 18:30:00 UTC
Dark Reading
Dark Reading
3 Drivers Behind the Increasing Frequency of DDoS Attacks

What's causing the uptick? Motivation, opportunity, and new capabilities.