Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-02 13:14:00 UTC
The Daily Swig
The Daily Swig
Canada plans revamp of its data privacy law

It’s too soon to tell the intention of outlined proposals

2020-01-01 00:57:00 UTC
HackRead
HackRead
Why Web Hosting Security is important?

By Waqas

If you run a website, its hosting security matters more than anything. Let's discuss it in detail...

This is a post from HackRead.com Read the original post: Why Web Hosting Security is important?

Security Backup Hacking Hosting Security
2019-12-31 19:04:00 UTC
HackRead
HackRead
Microsoft takes over domains used by hackers for large-scale cyber attacks

By Sudais

Microsoft has shown its true powers against a group of hackers. Here's what happened...

This is a post from HackRead.com Read the original post: Microsoft takes over domains used by hackers for large-scale cyber attacks

Cyber Crime Phishing Scam APT37 Cyber Attack Hacking Microsoft North Korea Security Thallium
2019-12-31 19:04:00 UTC
HackRead
HackRead
Microsoft pwns domains used by hackers for large-scale cyber attacks

By Sudais

Microsoft has shown its true powers against a group of hackers. Here's what happened...

This is a post from HackRead.com Read the original post: Microsoft pwns domains used by hackers for large-scale cyber attacks

Cyber Crime Phishing Scam APT37 Cyber Attack Hacking Microsoft North Korea Security Thallium
2019-12-31 15:32:00 UTC
The Daily Swig
The Daily Swig
Bug Bounty Radar // December 2019

New web targets for the discerning hacker

2019-12-31 15:00:00 UTC
Dark Reading
Dark Reading
Operational Technology: Why Old Networks Need to Learn New Tricks

Cybercriminals are maximizing their opportunity by targeting older vulnerabilities in OT environments. It's time to fight back.

2019-12-31 14:00:00 UTC
ThreatPost
ThreatPost
7 Tips for Maximizing Your SOC

Use the seven points listed above to create an effective and efficient operational workflow and, importantly, happier analysts who aren't buried at the bottom of a pile of mostly irrelevant data.

Hacks InfoSec Insider Malware Vulnerabilities Chris Calvert Infosec Insider Maximizing Respond Software Security Operations Center SOC Top Tips
2019-12-31 11:01:00 UTC
ThreatPost
ThreatPost
2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Cloud Security Critical Infrastructure IoT Malware Mobile Security Slideshow Vulnerabilities Web Security 5G AppSec Deep Fakes DevOppSec DevOpsSec End-of-life Insider Threats MFA Bypass Ransomware Slideshow Windows 7
2019-12-31 11:00:00 UTC
HackRead
HackRead
Online Privacy: What to Expect in 2020

By Uzair Amir

Without much ado, let's see what to expect in the world of online privacy in 2020 and how to prepare for the new changes. 

This is a post from HackRead.com Read the original post: Online Privacy: What to Expect in 2020

News CCPA GDPR Privacy Security Technology

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES