Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSRecently revised six-number password default exposed by failure to throttle guesses
We explain the "BootHole" vulnerablity - as usual, in plain English and without hype. Find if you're affected and what to do.
Chip-based credit and debit cards are designed to make it infeasible for skimming devices or malware to clone your card when you pay for something by dipping the chip instead of swiping the stripe. But a recent series of malware attacks on U.S.-based merchants suggest thieves are exploiting weaknesses in how certain financial institutions have implemented the technology to sidestep key chip card security features and effectively create usable, counterfeit cards.
The flaw could allow a remote, unauthenticated attacker to bypass authentication on vulnerable devices.
Off-the-shelf tools give attackers everything they need to build authentic-looking phishing campaigns Organizations must understand the tools used by cyber-scammers if they’re to tackle the growing ph
Like the universe, the attack surface is always expanding. Here's how to keep up and even get ahead.
A vulnerability in the state’s system may have exposed personal data that can be used for credential theft for those who filed Property Transfer Tax returns online.
New hacking technique overcomes ‘network jitter’ issue that can impact the success of side-channel attacks
New IBM study shows that security system complexity and cloud migration can amplify breach costs.
Adobe has released patches for critical and important-severity flaws in its popular Magento e-commerce platform.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESThis treasur...
Weekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 24 breaches were found and analysed resulting in 87,916,303 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included AT&T Division, US Consumer Opt In Records, Gosuslugi [2], Kava CasinoLife Poker and Stealer Log 0438