Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-12-06 23:01:00 UTC
HackRead
HackRead
New privacy tool exposes which website leaves your data unprotected

By Sudais

The new privacy tool will inform you if the site you are visiting expose your data or not. Here's how it's done...

This is a post from HackRead.com Read the original post: New privacy tool exposes which website leaves your data unprotected

Privacy Security Data LEAKS Security
2019-12-06 21:35:00 UTC
ThreatPost
ThreatPost
Email Voted a Weak Link for Election Security, with DMARC Lagging

Most counties are not protected from impersonation-based spearphishing attacks.

Uncategorized 2020 Presidential Election Counties Dmarc Adoption Election Security Email Valimail
2019-12-06 21:00:00 UTC
Dark Reading
Dark Reading
How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC

Money meant to fund an Israeli startup wound up directly deposited to the scammers.

2019-12-06 19:34:00 UTC
ThreatPost
ThreatPost
Feds Crack Down on Money Mules, Warn of BEC Scams

Authorities say they have halted over 600 domestic money mules – exceeding the 400 money mules stopped last year.

Government Web Security BEC Business Email Compromise Credential Theft Cybercriminal Evil Corp Fbi Warning Imminent Monitor Money Mule Nigerian Prince Operation Wirewire Phishing Phishing Attack Scam Silent Starling
2019-12-06 19:24:00 UTC
ThreatPost
ThreatPost
News Wrap: Authorities Target Evil Corp., Imminent Monitor, Money Mules

In this past week, the authorities have cracked down on various BEC scams and cybercrime gangs.

Government Podcasts BEC Business Email Compromise Credential Theft Cybercriminal Evil Corp Imminent Monitor Money Mule Nigerian Prince Operation Wirewire Phishing Phishing Attack Scam Silent Starling
2019-12-06 18:06:00 UTC
HackRead
HackRead
New Linux vulnerability puts VPN connections at risk of hijacking

By Waqas

Researchers believe that vulnerability can specifically affect VPN users by hijacking encrypted traffic. Here's how it happens...

This is a post from HackRead.com Read the original post: New Linux vulnerability puts VPN connections at risk of hijacking

Privacy Security IP Address Security Tor VPN Vulnerability
2019-12-06 17:30:00 UTC
Dark Reading
Dark Reading
Data Center Provider CyrusOne Confirms Ransomware Attack

The attack struck CyrusOne's managed services division and compromised six customers primarily serviced by a New York data center.

2019-12-06 16:54:00 UTC
ThreatPost
ThreatPost
Linux Bug Opens Most VPNs to Hijacking

In a coffee-shop scenario, attackers can hijack "secure" VPN sessions of those working remotely, injecting data into their TCP streams.

Vulnerabilities Attack Scenario Coffee Shop Attack CVE-2019-14899 Hijacking Linux Tcp Stream VPN Vulnerability
2019-12-06 16:23:00 UTC
The Daily Swig
The Daily Swig
The best hacks from Black Hat Europe 2019

Contactless cards, mobile comms, and car hacking catch the eye during London hacker fest

2019-12-06 15:15:00 UTC
The Daily Swig
The Daily Swig
#SocialSec – Hot takes on this week’s biggest cybersecurity news (Dec 6)

Black Hat Europe wraps up in London; Twitter opens Privacy Center; and HackerOne hands out a $20,000 bounty

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES