Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2024-08-08 14:00:00 UTC
Dark Reading
Dark Reading
Building an Effective Strategy to Manage AI Risks

As AI technologies continue to advance at a rapid pace, privacy, security and governance teams can't expect to achieve strong AI governance while working in isolation.

2024-08-08 13:21:00 UTC
Ars Technica
Ars Technica
Google and Meta ignored their own rules in secret teen-targeting ad deals

Project disregarded Google rules barring personalizing and targeting ads to minors.

Policy Google Privacy Syndication YouTube
2024-08-08 13:00:00 UTC
Dark Reading
Dark Reading
SaaS Apps Present an Abbreviated Kill Chain for Attackers

Black Hat presentation reveals adversaries don't need to complete all seven stages of a traditional kill chain to achieve their objectives.

2024-08-08 12:30:00 UTC
HackRead
HackRead
Thousands of Exposed Industrial Control Systems in US, UK Threaten Water Supplies

Thousands of Industrial Control Systems in the US and UK are vulnerable to cyberattacks, putting critical infrastructure like…

Security Cyber Attack Cybersecurity ICS IoT OT Technology Vulnerability
2024-08-08 12:00:00 UTC
Dark Reading
Dark Reading
Critical AWS Vulnerabilities Allow S3 Attack Bonanza

Researchers at Aqua Security discovered the "Shadow Resource" attack vector and the "Bucket Monopoly" problem, where threat actors can guess the name of S3 buckets based on their public account IDs.

2024-08-08 05:53:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Ransomware-Gruppen erhöhen Druck auf Zahlungsunwillige

Sophos beschreibt im neuen Dark-Web-Report “Turning the Screws: The Pressure Tactics of Ransomware Gangs” detailliert, wie Cyberkriminelle gestohlene Daten als Mittel einsetzen, um den Druck auf zahlungsunwillige Zielpersonen zu erhöhen. Zu den Druckmitteln gehören die Weitergabe von Kontaktdaten, das Veröffentlichen von Informationen über Familienmitglieder von CEOs und Geschäftsinhabern oder die Drohung, Informationen über illegale Geschäftsaktivitäten, […]

Threat Research Featured Ransomware
2024-08-07 23:20:00 UTC
Dark Reading
Dark Reading
Hazy Issue in Entra ID Allows Privileged Users to Become Global Admins

Invisible authentication mechanisms in Microsoft allow any attacker to escalate from privileged to super-duper privileged in cloud environments, paving the way for complete takeover.

2024-08-07 22:40:00 UTC
Ars Technica
Ars Technica
NASA official acknowledges internal “disagreement” on safety of Starliner return

"We heard from a lot of folks that had concerns."

Science Space Boeing Starliner Butch Wilmore Starliner Suni Williams
2024-08-07 22:15:00 UTC
Ars Technica
Ars Technica
The conspiracy theorists who think Biden has been replaced by AI

Anything you dislike can now be called an "AI fake."

AI Culture Ai Deepfake Conspiracy Conspiracy Theories Joe Biden
2024-08-07 22:00:00 UTC
Dark Reading
Dark Reading
Monitoring Changes in KEV List Can Guide Security Teams

The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES