Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-10-18 11:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Beware the square: how to spot malicious QR codes

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]

Products & Services Android IPhone QR Codes
2019-10-18 11:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Beware the square: how to spot malicious QR codes

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]

Products & Services Android IPhone QR Codes
2019-10-18 11:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Beware the square: how to spot malicious QR codes

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]

Products & Services Android IPhone QR Codes
2019-10-18 11:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Beware the square: how to spot malicious QR codes

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]

Products & Services Android IPhone QR Codes
2019-10-18 11:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Beware the square: how to spot malicious QR codes

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]

Products & Services Android IPhone QR Codes
2019-10-18 11:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Beware the square: how to spot malicious QR codes

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]

Products & Services Android IPhone QR Codes
2019-10-18 11:31:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Some Android adware apps hide icons to make it hard to remove them

SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the user’s device.

Android Google Adware Fleeceware Google Play Store Play Store
2019-10-18 11:25:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Bitcoin money trail leads cops to ‘world’s largest’ child abuse site

The Darknet server running the site, "Welcome to Video", and the website's convicted admin were tracked down by a global police force.

Law & Order Bitcoin Child Abuse Child Abuse Imagery Child Porn Child Sexual Abuse DarkNet Jong Woo Son South Korea Welcome To Video
2019-10-18 09:54:00 UTC
Naked Security | Sophos
Naked Security | Sophos
S2 Ep13.5: All about social media: Growing up online, parent advice and social shaming – Naked Security Podcast

A special episode dedicated to social media culture!

Podcast Social Networks Naked Security Podcast Social Media
2019-10-18 09:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Much-attacked Baltimore uses ‘mind-bogglingly’ bad data storage

IT workers have been storing files on their computers' hard drives. One councilman's alleged response: “That can’t be right? That’s real?”

Data Loss Government Security Ransomware Security Threats Backups Baltimore Data Storage Ransomware RobbinHood

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES
June 2024
By SUE DENIM
Dark-Web Forum Collapse, Lockbit’s Misdirection, and Europol’s Botnet Crackdown.
In the ever-dramatic world of cybercrime, a small dark-web forum has found itself in a downward spiral, now up for sale. As covered in our weekly insight, the forum was breached by an unknown threat actor, prompting the admin to panic and shut it down. This came just days after the admin had taken to Telegram to badmouth the threat actor community and insult Shiny Hunters, the admin of Breach Foru...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
15 July 2024
BREACHAWARE HQ

A total of 18 breaches were found and analysed resulting in 5,935,927 leaked accounts containing a total of 28 different data types. The breaches found publicly and freely available included Giant Tiger, Telegram Base 2019-2023, Stealer Log 0475, Stealer Log 0474 and Tattletale