Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2022-12-15 19:06:00 UTC
Dark Reading
Dark Reading
WatchGuard Threat Lab Report Finds Top Threat Arriving Exclusively Over Encrypted Connections

New research also analyzes the commoditization of adversary-in-the-middle attacks, JavaScript obfuscation in exploit kits, and a malware family with Gothic Panda ties.

2022-12-15 19:00:00 UTC
Dark Reading
Dark Reading
DDoS Attack Platforms Shut Down in Global Law Enforcement Operation

Sweeping operation took down around 50 popular DDoS platforms, just one of which was used in 30M attacks, Europol says.

2022-12-15 17:10:00 UTC
Naked Security | Sophos
Naked Security | Sophos
S3 Ep113: Pwning the Windows kernel – the crooks who hoodwinked Microsoft [Audio + Text]

Return o' the rookit, super-sneaky wireless spyware, credit card skimming, and patches galore. Listen and learn!

Apple Data Loss Malware Microsoft Podcast Privacy Vulnerability 0 Day Ben-Gurion University Ios Naked Security Podcast Skimming Supply Chain Vulnerability Zero Day
2022-12-15 16:20:00 UTC
Dark Reading
Dark Reading
Blackmailing MoneyMonger Malware Hides in Flutter Mobile Apps

Money-lending apps built using the Flutter software development kit hide a predatory spyware threat and highlight a growing trend of using personal data for blackmail.

2022-12-15 15:21:00 UTC
HackRead
HackRead
48 DDoS-hiring Services Busted by FBI in Major Sweep

By Waqas

Authorities have also arrested six individuals accused of running DDoS-for-hire services.

This is a post from HackRead.com Read the original post: 48 DDoS-hiring Services Busted by FBI in Major Sweep

Security Cyber Crime Cyber Attack DDOS Europol FBI Security
2022-12-15 15:00:00 UTC
Dark Reading
Dark Reading
Data Destruction Policies in the Age of Cloud Computing

It's time for on-the-record answers to questions about data destruction in cloud environments. Without access, how do you verify data has been destroyed? Do processes meet DoD standards, or do we need to adjust standards to meet reality?

2022-12-15 14:59:00 UTC
Dark Reading
Dark Reading
API Flaws in Lego Marketplace Put User Accounts, Data at Risk

Attackers also could breach internal production data to compromise a corporate network using vulnerabilities found in the BrickLink online platform.

2022-12-15 14:45:00 UTC
HackRead
HackRead
SEC Charges 8 Social Media Influencers Over Securities Fraud

By Habiba Rashid

According to the SEC, the accused used Twitter and Discord to carry out a securities fraud scheme, garnering approximately $114 million from it.

This is a post from HackRead.com Read the original post: SEC Charges 8 Social Media Influencers Over Securities Fraud

Cyber Crime Scams And Fraud DoJ Fraud Scam SEC Security Social Media
2022-12-15 14:24:00 UTC
The Daily Swig
The Daily Swig
Critical IP spoofing bug patched in Cacti

‘Not that hard to execute if attacker has access to a monitoring platform running Cacti’

2022-12-14 22:00:00 UTC
Dark Reading
Dark Reading
NSA Slices Up 5G Mobile Security Risks

The feds' mobile service provider guidance details cybersecurity threat vectors associated with 5G network slicing.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES