Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-10-10 10:04:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Job seekers are scrubbing clean their social media accounts

Most people nowadays are quite aware that hiring managers put their social media postings under a microscope, a new survey finds.

Facebook LinkedIn Privacy Social Networks Employment Job Applicants Job Candidates JPD Linkedin Online Privacy Recruiter Social Media
2019-10-09 19:07:00 UTC
ThreatPost
ThreatPost
Gamers Warned of High-Severity Intel, Nvidia Flaws

The Intel NUC and Nvidia Shield both are vulnerable to high-severity flaws, Intel and Nvidia warned in dual advisories.

Vulnerabilities CVE-2019-0163 CVE-2019-14569 CVE-2019-14570 CVE‑2019‑5699 CVE‑2019‑5700 Fix High Severity Flaw Intel Nvidia Nvidia Shield Patch Vulnerability
2019-10-09 18:54:00 UTC
ThreatPost
ThreatPost
Most Americans Fail Cybersecurity Quiz

Study participants fail to correctly identify core security concepts and tools to help them stay safe online.

Facebook Mobile Security Privacy Vulnerabilities Web Security 2FA Americans Cybersecurity Awareness HTTPS Instagram Pew Research Center Phishing WhatsApp
2019-10-09 16:17:00 UTC
HackRead
HackRead
Programmer hacks his attacker; releases decryption keys for Mushtik ransomware

By Sudais

“Hey guys, I hacked back this criminal and got the whole database with (Mushtik ransomware) keys.” The last laugh – it’s something that everyone would like to have. Turns out, a German programmer by the name of Tobias Fromel had it in a very dramatic fashion. It all started when he was infected by the […]

This is a post from HackRead.com Read the original post: Programmer hacks his attacker; releases decryption keys for Mushtik ransomware

Hacking News Hacking Malware Ransomware Security
2019-10-09 15:55:00 UTC
The Daily Swig
The Daily Swig
Ransomware still dominates the cyber threat landscape in 2019 – Europol report

Attack rates are dropping, but only to be replaced with more sophisticated and targeted assaults

2019-10-09 15:36:00 UTC
ThreatPost
ThreatPost
Privacy Groups: Ring’s Police Partnerships Can Lead to Sinister Ends

Increasing concerns over unauthorized surveillance, integration with facial recognition and more are plaguing the doorbell-video camera company.

Government IoT Privacy Amazon Doorbell Facial Recognition Law Enforcement Partnerships Open Letter Privacy Concerns Ring Senator Markey
2019-10-09 14:57:00 UTC
The Daily Swig
The Daily Swig
US healthcare provider admits data breach

Phishing attack against Methodist Hospitals may have exposed the medical, personal, and financial data of 68,000 patients

2019-10-09 14:53:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Sophos blijft zich ook met endpoint-oplossingen onderscheiden

Niet alleen door analisten, maar ook door partners en klanten wordt Sophos als ‘leider’ op securitygebied gezien. In de hectische wereld van security blijven endpoint-oplossingen volgens de vendor onverminderd belangrijk. Cyberdreigingen worden complexer en gevaarlijker. In de hele breedte wordt beveiliging daardoor belangrijker en dat geldt zeker ook voor endpoint security, vindt Brian Schippers, sales […]

Products & Services EDR Endpoint Firewall Intercept X Phish Threat Phishing Synchronized Security
2019-10-09 14:53:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Sophos blijft zich ook met endpoint-oplossingen onderscheiden

Niet alleen door analisten, maar ook door partners en klanten wordt Sophos als ‘leider’ op securitygebied gezien. In de hectische wereld van security blijven endpoint-oplossingen volgens de vendor onverminderd belangrijk. Cyberdreigingen worden complexer en gevaarlijker. In de hele breedte wordt beveiliging daardoor belangrijker en dat geldt zeker ook voor endpoint security, vindt Brian Schippers, sales […]

Products & Services EDR Endpoint Firewall Intercept X Phish Threat Phishing Synchronized Security
2019-10-09 14:53:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Sophos blijft zich ook met endpoint-oplossingen onderscheiden

Niet alleen door analisten, maar ook door partners en klanten wordt Sophos als ‘leider’ op securitygebied gezien. In de hectische wereld van security blijven endpoint-oplossingen volgens de vendor onverminderd belangrijk. Cyberdreigingen worden complexer en gevaarlijker. In de hele breedte wordt beveiliging daardoor belangrijker en dat geldt zeker ook voor endpoint security, vindt Brian Schippers, sales […]

Products & Services EDR Endpoint Firewall Intercept X Phish Threat Phishing Synchronized Security

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES
May 2024
By SUE DENIM
Breach Forums Resurrection, Government Breaches, and Shifting Motives
The saga of Breach Forums continues with twists and turns. Just when the FBI thought they'd scored another victory by seizing the infamous Breach Forums and arresting its co-administrator Baphomet, the remaining admin pulled a digital rabbit out of the hat. Despite the initial seizure of both the clear-net and Tor domains, as well as the Telegram channel, the FBI's victory was short-lived. Mere ho...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
24 June 2024
BREACHAWARE HQ

A total of 25 breaches were found and analysed resulting in 3,151,505 leaked accounts containing a total of 29 different data types. The breaches found publicly and freely available included mSpy, Stealer Log 0468, Kladzdor, Facebook [3] and Fit5