Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-22 15:47:00 UTC
ThreatPost
ThreatPost
sLoad Malware Revamped as Powerful ‘StarsLord’ Loader

The newest version of the sLoad malware dropper comes equipped with infection tracking capabilities and an anti-analysis trick.

Malware Anti-analysis Malware Malware Dropper Microsoft Microsoft Research New Version Sload Starslord
2020-01-22 15:38:00 UTC
The Daily Swig
The Daily Swig
The UK’s Computer Misuse Act is ‘crying out for reform’

Cross-sector report demands changes to outdated cybercrime law

2020-01-22 15:01:00 UTC
ThreatPost
ThreatPost
Microsoft Leaves 250M Customer Service Records Open to the Web

The trove of information is potentially a scammer's bonanza.

Breach Cloud Security Privacy Web Security 250 Million Bob Diachenko Cloud Database Cloud Misconfiguration Comparitech Customer Service Records Elasticsearch Microsoft Phishing Publicly Accessible Tech Support Scams
2020-01-22 15:00:00 UTC
Dark Reading
Dark Reading
Cybersecurity Lessons Learned from 'The Rise of Skywalker'

They're especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords.

2020-01-22 13:47:00 UTC
HackRead
HackRead
250 million Microsoft customer support records leaked in plain text

By Waqas

So Microsoft Customer Service and Support (CSS) records have been leaked online. Here's what's in the leaked data...

This is a post from HackRead.com Read the original post: 250 million Microsoft customer support records leaked in plain text

Leaks Security BinaryEdge Breach Business LEAKS Microsoft Privacy Security Vulnerability
2020-01-22 13:06:00 UTC
The Daily Swig
The Daily Swig
ProtonMail dismisses John McAfee’s ‘nonsensical argument’ over encryption

Antivirus pioneer posts two-minute rant explaining that ‘encryption is a worthless piece of shit technology’

2020-01-22 13:01:00 UTC
ThreatPost
ThreatPost
New Muhstik Botnet Attacks Target Tomato Routers

Palo Alto Networks’ Unit 42 researchers observed a variant of the wormlike botnet that adds scanner technology to brute-force Web authentication.

IoT Botnet Drupal HTTP Ports Internet Of Things Linux Muhstik Router Shodan Tomato Router VPN Wordpress
2020-01-22 11:39:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Ubisoft sues DDoS-for-hire operators for ruining game play

The network of sites and services run by the alleged operators target the Rainbow Six Siege game, selling attacks to cheating players.

2-factor Authentication Denial Of Service Law & Order Security Threats Booter Sites Booters CFAA Computer Fraud And Abuse Act DDoS DDoS-for-hire Gaming Lawsuit Online Gaming Penetration Testing R6S Rainbow Six Siege Ubisoft
2020-01-22 11:01:00 UTC
ThreatPost
ThreatPost
PoC Exploits Do More Good Than Harm: Threatpost Poll

More than half of security experts think that the good outweighs the bad when it comes to proof-of-concept exploits, according to a recent Threatpost poll.

Hacks Web Security Active Exploit Citrix Patch PoC Code Poc Exploit Proof Of Concept Vulnerability Disclosure
2020-01-22 10:56:00 UTC
Naked Security | Sophos
Naked Security | Sophos
NIST’s new privacy rules – what you need to know

How do you ensure you're compliant with privacy regulations? NIST has released a Privacy Framework to help you get your house in order.

Privacy CCPA Cybersecurity Framework GDPR National Institute Of Standards And Technology Nist Privacy Framework Privacy Regulation

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES