Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Infosec News Feed

An aggregated list of cybersecurity publications
2022-05-26 15:26:00 UTC
The Daily Swig
The Daily Swig
LinkedIn bug bounty program goes public with rewards of up to $18k

Social media platform ends private program after paying $250,000 in rewards over eight years

2022-05-26 14:11:00 UTC
The Daily Swig
The Daily Swig
Canadian healthcare provider issues data breach warning after server hack

SHN plays down concerns over medical records breach

2022-05-26 14:00:00 UTC
Dark Reading
Dark Reading
Act Now: Leveraging PCI Compliance to Improve Security

Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.

2022-05-26 13:00:00 UTC
Dark Reading
Dark Reading
Quanta Servers Caught With Pantsdown BMC Vulnerability

Researchers discover 3-year-old critical firmware vulnerability running in popular cloud servers used to power hyperscalers and cloud providers alike.

2022-05-26 13:00:00 UTC
Dark Reading
Dark Reading
Quanta Servers Caught With 'Pantsdown' BMC Vulnerability

Researchers discover 3-year-old critical firmware vulnerability, running in popular cloud servers used to power hyperscalers and cloud providers alike.

2022-05-26 12:41:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Who’s watching your webcam? The Screencastify Chrome extension story…

When you really need to make exceptions in cybersecurity, specify them as explicitly as you can.

Privacy Chrome Store Need-to-know Screencastify Webcam
2022-05-26 10:30:00 UTC
ThreatPost
ThreatPost
Cybergang Claims REvil is Back, Executes DDoS Attacks

Actors claiming to be the defunct ransomware group are targeting one of Akami’s customers with a Layer 7 attack, demanding an extortion payment in Bitcoin.

Hacks Malware
2022-05-26 00:19:00 UTC
HackRead
HackRead
How Software Architects Can Manage Technical Debt in a Microservice Architecture

By Owais Sultan

Most software architects wear two different hats – they act as software engineers and technical leaders. However, software…

This is a post from HackRead.com Read the original post: How Software Architects Can Manage Technical Debt in a Microservice Architecture

Technology Business Software
2022-05-25 23:59:00 UTC
HackRead
HackRead
Food For Files: GoodWill Ransomware demands food for the poor to decrypt locked files

By Waqas

GoodWill ransomware attackers share a three-page ransom note asking the victim to perform three tasks to get the…

This is a post from HackRead.com Read the original post: Food For Files: GoodWill Ransomware demands food for the poor to decrypt locked files

Security Malware Charity Cyber Crime Decryption GoodWill Ransomware Security
2022-05-25 22:11:00 UTC
Dark Reading
Dark Reading
Most Common Threats in DBIR

Supply chain and ransomware attacks increased dramatically this year, which explains why so many data breaches in this year's DBIR were grouped as system intrusion.