Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Infosec News Feed

An aggregated list of cybersecurity publications
2018-11-08 17:39:00 UTC
ThreatPost
ThreatPost
Cisco Accidentally Released Dirty Cow Exploit Code in Software

Cisco revealed that it had "inadvertently" shipped an in-house exploit code that was used in test scripts as part of  its TelePresence Video Communication Server and Expressway Series software.

Vulnerabilities Cisco Cisco Switch Cisco Vulnerability Dirty Cow Vulnerability Exploit Exploit Code Fix Patch
2018-11-08 16:41:00 UTC
HackRead
HackRead
Russian exploit developer publicly disclosed VirtualBox zero-day vulnerability

By Waqas

An independent IT security researcher and exploit developer from Russia has publicly revealed a zero-day vulnerability in all versions of VirtualBox (VB) 5.2.20 and prior. VB is commonly used open source virtualization software that has been developed by Oracle. According to the analysis of Sergey Zelenyuk, his exploit is hundred percent reliable and memory corruption […]

This is a post from HackRead.com Read the original post: Russian exploit developer publicly disclosed VirtualBox zero-day vulnerability

Security GitHub Oracle Russia Security VirtualBox Vulnerability Zero-day
2018-11-08 16:39:00 UTC
ThreatPost
ThreatPost
‘DerpTroll’ Faces 10 Years in Prison for DDoSing Gaming Sites as a Teen

He admitted to taking Steam, EA Origin and Sony Online Entertainment offline in 2013 and 2014, causing at least $95,000 in damages.

Hacks Web Security Austin Thompson DDoS Derptroll Ea Origin Gaming Guilty Plea PlayStation Prison Sony Teenagers
2018-11-08 16:15:00 UTC
The Daily Swig
The Daily Swig
Websites peddling ‘deceptive content’ face Chrome-mediated ad ban

Pop-up slingers face financial sanctions from Google

2018-11-08 15:30:00 UTC
Dark Reading
Dark Reading
5 Things the Most Secure Software Companies Do (and How You Can Be Like Them)

What sets apart the largest and most innovative software engineering organizations? These five approaches are a good way to start, and they won't break the bank.

2018-11-08 14:29:00 UTC
ThreatPost
ThreatPost
DJI Patches Forum Bug That Allowed Drone Account Takeovers

Bug opened door for malicious link attack, giving hacker access to stored DJI drone data of commercial and consumer customers.

Cloud Security Critical Infrastructure Hacks Privacy Vulnerabilities Certificate Pinning Cross-site Scripting DJI DJI FlightHub DJI Mobile Apps JavaScript Injection Secure Cookie
2018-11-08 14:04:00 UTC
ThreatPost
ThreatPost
Podcast: Troy Hunt Talks Bad Passwords – and Who’s to Blame for Them

Troy Hunt sounds off on how both consumers and services have a joint role in creating and enforcing strong passwords.

Breach Podcasts Privacy Web Security CloudFlare Have I Been Pwned Mozilla Password Troy Hunt Webauthn
2018-11-08 14:03:00 UTC
The Daily Swig
The Daily Swig
Canada Post makes a hash of weed smokers’ security

Ontario Cannabis Store customers hit by data breach

2018-11-08 13:52:00 UTC
ThreatPost
ThreatPost
Apple Modernizes Its Hardware Security with T2

Apple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing?

Featured Malware Mobile Security Privacy Apple Closed Lid Hardware Root Of Trust Hardware Security Macbook Air Secure Computing Storage T2 Chip
2018-11-08 12:10:00 UTC
HackRead
HackRead
4 things you didn’t know a VPN could do

By Sabrina Bucknole

Until recently, many people thought of VPNs as a tool used by tech-savvy kids to anonymously download music and films. But, as concern about the use and security of personal data online continues to rise, it is no surprise that the number of people using a Virtual Private Network (VPN) has increased dramatically – and […]

This is a post from HackRead.com Read the original post: 4 things you didn’t know a VPN could do

Privacy Technology News Anonymity Anonymous Security Technology Tor VPN