Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-07-30 15:52:00 UTC
The Daily Swig
The Daily Swig
Zoom fixes flaws that allowed brute-force attacks to crack private meeting passwords

Recently revised six-number password default exposed by failure to throttle guesses

2020-07-30 15:35:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Servers at risk from “BootHole” bug – what you need to know

We explain the "BootHole" vulnerablity - as usual, in plain English and without hype. Find if you're affected and what to do.

Vulnerability BootHole CVE-2020-10713 Vulnerability
2020-07-30 15:09:00 UTC
Krebs on Security
Krebs on Security
Is Your Chip Card Secure? Much Depends on Where You Bank

Chip-based credit and debit cards are designed to make it infeasible for skimming devices or malware to clone your card when you pay for something by dipping the chip instead of swiping the stripe. But a recent series of malware attacks on U.S.-based merchants suggest thieves are exploiting weaknesses in how certain financial institutions have implemented the technology to sidestep key chip card security features and effectively create usable, counterfeit cards.

All About Skimmers Latest Warnings The Coming Storm Chip Cards Cvv Cyber R&D Labs EMV Gemini Advisory ICVV Key Food Breach POS Malware Shimmers Skimmers Stas Alforov Visa
2020-07-30 14:36:00 UTC
ThreatPost
ThreatPost
Critical, High-Severity Cisco Flaws Fixed in Data Center Network Manager

The flaw could allow a remote, unauthenticated attacker to bypass authentication on vulnerable devices.

Vulnerabilities Web Security Cisco Critical Cisco Flaw CVE-2020-3382 Data Center Network Manager Dcnm Fix Patch REST API Security Vulnerability
2020-07-30 14:19:00 UTC
The Daily Swig
The Daily Swig
DIY phishing kits dissected: Organizations urged to tackle the underground ecosystem that democratized cybercrime

Off-the-shelf tools give attackers everything they need to build authentic-looking phishing campaigns Organizations must understand the tools used by cyber-scammers if they’re to tackle the growing ph

2020-07-30 14:00:00 UTC
Dark Reading
Dark Reading
Using the Attack Cycle to Up Your Security Game

Like the universe, the attack surface is always expanding. Here's how to keep up and even get ahead.

2020-07-30 13:32:00 UTC
ThreatPost
ThreatPost
Vermont Taxpayers Warned of Data Leak Over the Past Three Years

A vulnerability in the state’s system may have exposed personal data that can be used for credential theft for those who filed Property Transfer Tax returns online.

Breach Hacks Privacy ` Credential Theft Data Breach Online Security Tax Returns Taxpayer Data Threat Actors Vermont Vulnerability
2020-07-30 12:31:00 UTC
The Daily Swig
The Daily Swig
Researchers exploit HTTP/2, WPA3 protocols to stage highly efficient ‘timeless timing’ attacks

New hacking technique overcomes ‘network jitter’ issue that can impact the success of side-channel attacks

2020-07-29 21:45:00 UTC
Dark Reading
Dark Reading
Average Cost of a Data Breach: $3.86 Million

New IBM study shows that security system complexity and cloud migration can amplify breach costs.

2020-07-29 21:22:00 UTC
ThreatPost
ThreatPost
Critical Magento Flaws Allow Code Execution

Adobe has released patches for critical and important-severity flaws in its popular Magento e-commerce platform.

Vulnerabilities Web Security Adobe Code Execution Critical Flaw CVE-2020-9689 CVE-2020-9690 ECommerce Fix Magecart Magento Patch Security Vulnerability

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
February 2024
By SUE DENIM
The Truth Behind "The Xun" Repository Bombshell.
Well, well, well, it seems the digital waters are getting murkier by the day. A mysterious GitHub user by the name of I-SOON recently made their grand entrance onto the coding scene, dropping a repository bombshell titled "The Truth Behind an Xun." Inside? Oh, just a casual 200 megabytes of top-secret intel about a Chinese cybersecurity company. Talk about spilling the digital tea!

This treasur...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
25 March 2024
BREACHAWARE HQ

A total of 24 breaches were found and analysed resulting in 87,916,303 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included AT&T Division, US Consumer Opt In Records, Gosuslugi [2], Kava CasinoLife Poker and Stealer Log 0438