Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-12-11 22:35:00 UTC
Dark Reading
Dark Reading
Trickbot Operators Now Selling Attack Tools to APT Actors

North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.

2019-12-11 22:31:00 UTC
Krebs on Security
Krebs on Security
The Great $50M African IP Address Heist

A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions of dollars worth of the increasingly scarce resource to online marketers. The allegations stemmed from a three-year investigation by a U.S.-based researcher whose findings shed light on a murky area of Internet governance that is all too often exploited by spammers and scammers alike.

A Little Sunshine Web Fraud 2.0 Adconion Direct AFRINIC Afriq*Access Bill Woodcock Eddy Kayihura Infoplan Ipv4leasing ITC Jan Vermeulen Mybroadband.co.za Packet Clearing House Ron Guilmette The African Network Information Centre
2019-12-11 21:16:00 UTC
ThreatPost
ThreatPost
Smart Krampus-3PC Malware Targets iPhone Users

The malware affected 100 different online publishers.

Malware Mobile Security Web Security Information Harvesting Iphone Users Krampus-3pc Malicious Redirects Malvertising Malware Analysis Media Trust Online Accounts
2019-12-11 20:38:00 UTC
ThreatPost
ThreatPost
Serious Security Flaws Found in Children’s Connected Toys

Several toys that were tested have been found lacking authentication measures, opening them up to an array of insidious attacks.

IoT Vulnerabilities Web Security Authentication Connected Toy Iot Smart Toy Privacy Privacy Policy Vulnerability
2019-12-11 19:49:00 UTC
ThreatPost
ThreatPost
Apple Fixes ‘AirDoS’ Bug That Cripples Nearby iPhones, iPads

Apple fixes bug that allows nearby hackers to render iPads and iPhones unusable.

Hacks Mobile Security Vulnerabilities Airdos Airdrop Github Ios IPad Iphone MacOS MacOS Catalina MacOS High Sierra
2019-12-11 19:00:00 UTC
Dark Reading
Dark Reading
5 Tips for Keeping Your Security Team on Target

In nearly every security environment, competing priorities are a constant battleground. Here's how to keep the focus on what's important.

2019-12-11 18:52:00 UTC
ThreatPost
ThreatPost
Signal Tests Upgraded Cryptography for Groups Function

The secure messaging service is looking to address usability issues.

Cryptography Privacy Cryptography Groups Private Groups Secure Messaging Signal Usability
2019-12-11 16:48:00 UTC
The Daily Swig
The Daily Swig
‘Alexa, hack my serverless technology’ – attacking web apps with voice commands

Amazon’s voice assistant wisecracks her way through SQL injection attacks on serverless environments at Black Hat Europe

2019-12-11 16:01:00 UTC
ThreatPost
ThreatPost
Modern Intel CPUs Plagued By Plundervolt Attack

The Intel attack uses a similar technique that gamers commonly use to overclock their CPUs.

Vulnerabilities Cpu Voltage CVE-2019-11157 Information Disclosure Intel Intel Attack Intel SGX Meltdown Plundervolt Privilege Escalation Side-channel Attack Spectre Vulnerability
2019-12-11 15:55:00 UTC
Dark Reading
Dark Reading
Only Half of Malware Caught by Signature AV

Machine learning and behavioral detection are necessary to catch threats, WatchGuard says in a new report. Meanwhile, network attacks have risen, especially against older vulnerabilities, such as those in Apache Struts.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES