Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSAttackers look to drain their victims’ cloud computing resources – and their bank accounts
A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.
Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.
By Zara Khan
Somehow, the misconfigured Elasticsearch cluster did not contain medical data of patients.
This is a post from HackRead.com Read the original post: Medical software firm leakes personal data of 3.1 million patients
Breach disclosures are down, and reported ransomware attacks have also plummeted. Good news -- or a calm before the storm?
Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.
The APT is becoming more sophisticated over time.
Researchers analyze a presumably Russian-speaking APT group that has been stealing corporate data since 2018.
Eight teams competed to win cash, bragging rights, and the chance to control a satellite in space.
By Waqas
RedCurl hackers are running one of the most well-organized espionage campaigns for years.
This is a post from HackRead.com Read the original post: RedCurl hackers launched 26 espionage campaigns to steal trade secrets
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESWeekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 11 breaches were found and analysed resulting in 8,670,369 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included A MONEY, Raychat, Bin Weevils, ZOON and Stealer Log 0450