Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2022-12-22 15:00:00 UTC
Dark Reading
Dark Reading
Threat Modeling in the Age of OpenAI's Chatbot

New technical chatbot capabilities raise the promise that their help in threat modeling could free humans for more interesting work.

2022-12-22 15:00:00 UTC
Dark Reading
Dark Reading
'Sextortion,' Business Disruption, and a Massive Attack: What Could Be in Store for 2023

Our growing interconnectedness poses almost as many challenges as it does benefits.

2022-12-22 14:31:00 UTC
HackRead
HackRead
Media Giant Guardian Hit By Suspected Ransomware Attack

By Habiba Rashid

It is still unclear who was behind the suspected ransomware attack on The Guardian.

This is a post from HackRead.com Read the original post: Media Giant Guardian Hit By Suspected Ransomware Attack

Security Cyber Attacks Cyber Attack Guardian Malware Ransomware Security
2022-12-22 14:25:00 UTC
HackRead
HackRead
Cyber Threats Increasingly Target Video Games

By Owais Sultan

According to Statista, today, a large number of people of all ages play video games; about 2.5 billion…

This is a post from HackRead.com Read the original post: Cyber Threats Increasingly Target Video Games

Gaming Security Cyber Security Gaming Malware Scam Technology Vulnerability
2022-12-22 14:03:00 UTC
Dark Reading
Dark Reading
Zerobot Adds Brute Force, DDoS to Its IoT Attack Arsenal

Threat actors continue to evolve the malicious botnet, which has also added a list of new vulnerabilities it can use to target devices.

2022-12-22 12:00:00 UTC
The Daily Swig
The Daily Swig
Zoom Whiteboard patches XSS bug

Video conferencing platform fixes cross-site scripting vulnerability

2022-12-22 09:14:00 UTC
HackRead
HackRead
The Different Ways to Mine Cryptocurrency

By Owais Sultan

When looking to mine cryptocurrency, you should always go for legal options of which there are plenty. A…

This is a post from HackRead.com Read the original post: The Different Ways to Mine Cryptocurrency

Cryptocurrency Bitcoin Crypto Cryptomining Decentralization Ethereum
2022-12-21 22:19:00 UTC
HackRead
HackRead
GitHub Attack Allowed Attackers to Steal Okta’s Source Code

By Deeba Ahmed

Okta has, however, confirmed that attackers couldn’t access its customer data or services. Authentication giant Okta has suffered…

This is a post from HackRead.com Read the original post: GitHub Attack Allowed Attackers to Steal Okta’s Source Code

Security Cyber Attacks Cyber Attack GitHub Hacking Okta Security Source Code Vulnerability
2022-12-21 22:00:00 UTC
Dark Reading
Dark Reading
Supply Chain Risks Got You Down? Keep Calm and Get Strategic!

Security leaders must maintain an effective cybersecurity strategy to help filter some of the noise on new vulnerabilities.

2022-12-21 20:45:00 UTC
Dark Reading
Dark Reading
Ransomware Attackers Bypass Microsoft's ProxyNotShell Mitigations With Fresh Exploit

The Play ransomware group was spotted exploiting another little-known SSRF bug to trigger RCE on affected Exchange servers.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES