Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-27 12:14:00 UTC
HackRead
HackRead
Rent out the best properties online in India with these tips

By Owais Sultan

An online portal for renting our proterties.

This is a post from HackRead.com Read the original post: Rent out the best properties online in India with these tips

Sponsored
2020-01-27 11:38:00 UTC
The Daily Swig
The Daily Swig
Citrix rolls out final patches to defend against ‘Shitrix’ vulnerability

Immediate patching urged as Sodinokibi ransomware gang targets vulnerable systems

2020-01-27 11:12:00 UTC
Naked Security | Sophos
Naked Security | Sophos
New York wants to ban taxpayer-funded ransomware payments

One of the proposed bills would set up a $5m fund to help small towns upgrade their systems and bolster their security.

Data Loss Law & Order Malware Ransomware Security Threats Legislation Malware New York New York Senate Ransom Payment Ransomware S7246 S7289
2020-01-27 10:22:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Monday review – the hot 21 stories of the week

From a big Microsoft data breach to the seizing of a stolen-creds site by the FBI - and everything in between. It's weekly roundup time.

Weekly Summary Computer Security Infosec Monday Review News Security News Weekly Roundup
2020-01-26 10:30:00 UTC
HackRead
HackRead
Watch out for Shlayer malware targeting Mac devices

By Waqas

Researchers believe Shlayer malware is the most widespread macOS threat...

This is a post from HackRead.com Read the original post: Watch out for Shlayer malware targeting Mac devices

Apple News Malware Security Apple Mac MacOS Security Shlayer
2020-01-24 21:34:00 UTC
ThreatPost
ThreatPost
ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates

Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.

Malware Most Recent ThreatLists Email Phishing Malware Msp Pay The Ransom Ransom Ransomware Ransomware As A Service Remote Desktop Protocol Ryuk Sodinokibi
2020-01-24 21:02:00 UTC
HackRead
HackRead
Netgear vulnerability exposed TLS certificates to public

By Sudais Asif

TLS certificates can be used to intercept and tamper with secure connections...

This is a post from HackRead.com Read the original post: Netgear vulnerability exposed TLS certificates to public

Security Encryption Netgear Router Security Vulnerability
2020-01-24 19:39:00 UTC
HackRead
HackRead
The importance of protecting your devices from cyber attack

By Waqas

Innovation is advancing each day. Training, which is the essential route through which we grant information...

This is a post from HackRead.com Read the original post: The importance of protecting your devices from cyber attack

Sponsored
2020-01-24 19:27:00 UTC
ThreatPost
ThreatPost
Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings

The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.

Vulnerabilities Web Security Cisco Cisco Flaw Cisco Patch Cisco Video Conferencing Vulnerability Conference Meeting High Severity Flaw Patch Video Conferencing Webex WebEx Flaw
2020-01-24 17:37:00 UTC
ThreatPost
ThreatPost
New Bill Proposes NSA Surveillance Reforms

The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.

Government Privacy Cell Phone Data Data Collection Government Surveillance National Security Agency NSA NSA Surveillance Patriot Act Privacy Bill Ron Widen Safeguarding Americans’ Private Records Act Section 215 Snowden Steve Danes Surveillance Us Gov

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES