Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

2019-12-02 17:08:00 UTC
The Daily Swig
The Daily Swig
Android vulnerability StrandHogg shatters user privacy, impacts top 500 apps

All versions of the Android mobile operating system are affected

2019-12-02 16:46:00 UTC
CISA Pushing U.S. Agencies to Adopt Vulnerability Disclosure Policies

A newly proposed CISA directive would require all U.S. agencies to develop and implement vulnerability disclosure processes for their internet connected systems.

Bug Bounty Government Vulnerabilities Bug Bounty CISA Cybersecurity And Infrastructure Security Agency Directive Hacker Us Agencies Vulnerability Vulnerability Disclosure White Hat Hacker
2019-12-02 15:33:00 UTC
Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds Warn

TV takeover, privacy threats, botnet concerns and Wi-Fi network compromise are all big concerns when it comes to connected TVs.

Government Hacks IoT Privacy Vulnerabilities Web Security Black Friday Sale Botnet Cyber Monday Device Takeover Fbi Warning Internet Of Things IoT Security Mirai Network Compromise Patches Smart TVs Vulnerabilities
2019-12-02 15:00:00 UTC
Dark Reading
Dark Reading
3 Modern Myths of Threat Intelligence

More intelligence does not lead to more security. Here's why.

2019-12-02 13:33:00 UTC
Insecure Database Exposes Millions of Private SMS Messages

Researchers discovered an unprotected TrueDialog database hosted by Microsoft Azure with diverse and business-related data from tens of millions of users.

Breach Cloud Security Privacy Data Breach Data Privacy Database Security Hosted Services Microsoft Microsoft Azure Oracle Security Small Businesses SMS Messages Telecommunications TrueDialog VpnMentor
2019-12-02 11:25:00 UTC
The Daily Swig
The Daily Swig
Malvertising is on the decline but serious security issues remain

One in every 250 ad impressions are still problematic, research suggests

2019-12-02 11:23:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Fake Android apps uploaded to Play store by notorious Sandworm hackers

The Russian ‘Sandworm’ hacking group has been caught repeatedly uploading fake and modified Android apps to Google’s Play Store.

Google Government Security Malware Security Threats Android Google Play Google Threat Analysis Group (TAG) Malware NotPetya Russia Russian Hacker Sandworm
2019-12-02 11:05:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Uncle Sam opens arms to friendly hackers

All you bug hunters out there are about to get a nice Christmas gift - the US federal government finally wants to hear from you.

Government Security Security Threats Bug Bug Bounty Bug Disclosure Government Security Helpful Hackers Responsible Disclosure US Government
2019-12-02 10:42:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Convicted murderer wins ‘right to be forgotten’ case

Google must remove details of a convicted murderer from its search results in Europe following a German court ruling, it emerged last week.

GDPR Compliance Google Privacy EU European Court Of Justice GDPR Germany Murder Right To Be Forgetten RTBF Search Results
2019-12-02 10:30:00 UTC
Naked Security | Sophos
Naked Security | Sophos
TikTok owner to separate company over US national security worries

Chinese-owned video-sharing app TikTok might be under fire from US politicians but it’s not going to go down without a fight.

Government Security Law & Order Privacy Security Threats ByteDance China Data Surveillance National Security TikTok

BreachAware Insight


Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

April 2024
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

27 May 2024

A total of 24 breaches were found and analysed resulting in 4,340,106 leaked accounts containing a total of 23 different data types. The breaches found publicly and freely available included Kringle Cash, Stealer Log 0462, Games Nord, Money Man and NOSIS