Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSBy Sudais Asif
Before dropping NetSupport Manager RAT, attackers trick users into opening a malicious MS Word document by entering a password.
This is a post from HackRead.com Read the original post: Hackers are using Word documents to drop NetSupport Manager RAT
Threatpost talks to Alex Tilley, senior security researcher with Dell SecureWorks' Counter Threat Unit Research Team, about a recently discovered campaign linked to an Iranian APT.
When it's impossible to remediate all vulnerabilities in an organization, data can indicate which bugs should be prioritized.
On Wednesday millions of Transport Layer Security certificates will be revoked because of a Certificate Authority Authorization bug.
An exploit published by a developer is easy to use and has already been used to build malicious apps that gain root access on Android devices.
How much data is too much to give away to get online while you're waiting at the train station? In the airport? A shopping mall?
The 25-year-old was convicted of 18 charges stemming from illegal access to money stored in online gift cards.
Canadian province may set country’s future privacy standard
Troy Hunt said the popular HIBP will continue to be run as an independent service.
Last week, KrebsOnSecurity reported to health insurance provider Blue Shield of California that its Web site was flagged by multiple security products as serving malicious content. Blue Shield quickly removed the unauthorized code. An investigation determined it was injected by a browser extension installed on the computer of a Blue Shield employee who'd edited the Web site in the past month.
The incident is a reminder that browser extensions -- however useful or fun they may seem when you install them -- typically have a great deal of power and can effectively read and/or write all data in your browsing sessions. And as we'll see, it's not uncommon for extension makers to sell or lease their user base to shady advertising firms, or in some cases abandon them to outright cybercriminals.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Point of View
OUR TAKE ON TRENDING STORIESWeekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESA total of 11 breaches were found and analysed resulting in 8,670,369 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included A MONEY, Raychat, Bin Weevils, ZOON and Stealer Log 0450