Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-12-30 15:00:00 UTC
Dark Reading
Dark Reading
Fraud in the New Decade

Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growth

2019-12-30 14:00:00 UTC
Dark Reading
Dark Reading
The Coolest Hacks of 2019
2019-12-30 14:00:00 UTC
ThreatPost
ThreatPost
Mean Time to Hardening: The Next-Gen Security Metric

Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours to harden your systems before you will see new exploits.

Hacks InfoSec Insider Vulnerabilities Automox Cybersecurity Metrics EDR Endpoint Detection And Response Exploits Infosec Insider Mean Time To Harden Patch Management Patching Richard Melick Time To Exploitation Vulnerabilities
2019-12-30 14:00:00 UTC
ThreatPost
ThreatPost
Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost's Top 10 mobile security stories of 2019.

IoT Malware Mobile Security Privacy Slideshow Vulnerabilities Web Security 5G Android Apple Biometrics Bypass Checkra1n Jailbreak Mobile Security NSO Group Stalkerware Top Stories 2019 WhatsApp
2019-12-30 13:01:00 UTC
The Daily Swig
The Daily Swig
Year in Review: Security needs a reboot in 2020

Why do we keep making the same mistakes? Dave Lewis reflects on the year past, warts and all

2019-12-30 12:32:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Monday review – the hot 12 stories of the week

From smartphone tracking to "climate change" malware, get up to date with everything we've written in the last week.

Weekly Summary Computer Security Infosec Monday Review News Security News Weekly Roundup
2019-12-30 10:30:00 UTC
The Daily Swig
The Daily Swig
The year in #StupidSecurity – 2019’s biggest security and privacy blunders

Flagrant tales of epic (security) fails

2019-12-30 00:49:00 UTC
Krebs on Security
Krebs on Security
Happy 10th Birthday, KrebsOnSecurity.com

Today marks the 10th anniversary of KrebsOnSecurity.com! Over the past decade, the site has featured more than 1,800 stories focusing mainly on cybercrime, computer security and user privacy concerns. And what a decade it has been. Stories here have exposed countless scams, data breaches, cybercrooks and corporate stumbles. In the ten years since its inception, […]

Other
2019-12-29 23:30:00 UTC
HackRead
HackRead
4 uses for programmable logic controllers in industrial settings

By Waqas

It’s fair to say that programmable logic controllers (PLCs) are the brains of industrial systems...

This is a post from HackRead.com Read the original post: 4 uses for programmable logic controllers in industrial settings

Technology News PLCs Technology
2019-12-28 21:30:00 UTC
Naked Security | Sophos
Naked Security | Sophos
7 types of virus – a short glossary of contemporary cyberbadness

Here's a short list of 7 malware categories we hope you never encounter. Sadly, it's not an exhaustive list... but it's a helpful start.

Malware Banking Trojan Data Stealer Keylogger Malware RAM Scraper Ransomware RAT

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES