Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-11-14 22:12:00 UTC
ThreatPost
ThreatPost
Double Vision: Stealthy Malware Dropper Delivers Dual RATs

A lengthy, multi-stage infection process leads to a duo of payloads, bent on stealing data.

Malware Data Exfiltration Double Payloads Double Rat Malware Analysis Malware Dropper Remote Access Trojan Revengerat Wsh Rat
2019-11-14 19:10:00 UTC
Dark Reading
Dark Reading
Attacks on Healthcare Jump 60% in 2019 - So Far

Well-known Trojans Emotet and Trickbot are cybercriminals' favorite weapons in their campaigns.

2019-11-14 19:00:00 UTC
Dark Reading
Dark Reading
5 Cybersecurity CISO Priorities for the Future

Seven chief information security officers share their pain points and two-year spending plans.

2019-11-14 17:13:00 UTC
ThreatPost
ThreatPost
Just-Released Checkra1n iPhone Jailbreak Stirs Security Concerns

Now that the checkm8 BootROM vulnerability has a working exploit, security pros are warning of potential attacks.

Hacks Mobile Security Vulnerabilities A11 Chip A5 Chip App Store Apple Axi0mX BootROM Exploit Checkm8 Checkra1n IOS 12.3 IOS 13.2.2 IPad Iphone Ipod Touch Jailbreak
2019-11-14 15:46:00 UTC
The Daily Swig
The Daily Swig
Paris Call, one year on: Assessing the impact of global cybersecurity declaration

More than 70 nations have signed up to the global cybersecurity initiative, although China, Russia, and the US remain notable omissions

2019-11-14 15:32:00 UTC
ThreatPost
ThreatPost
California’s Domino Effect on U.S. Privacy Regulation

In this video, a security expert discusses the California Consumer Privacy Act (CCPA), and its potential impact on privacy regulation across the U.S.

Featured Government Hacks IoT Videos California CCPA Consumer Privacy Data Privacy Enfuse 2019 GDPR Janet De Guzman Podcast Privacy Privacy Regulation Security Law Security Regulation
2019-11-14 15:18:00 UTC
ThreatPost
ThreatPost
Website, Know Thyself: What Code Are You Serving?

Code-injection via third- and fourth-party scripts -- as seen with Magecart -- is a growing security problem for websites.

Hacks InfoSec Insider Web Security Advice Akamai Code Injection Defense Infosec Insider Magecart Third-party Scripts Tony Lauro Website Security
2019-11-14 15:00:00 UTC
Dark Reading
Dark Reading
How Does Your Cyber Resilience Measure Up?

The security measures companies take today may not be enough for tomorrow's cyber assault, but switching to a proactive, risk-based framework may better protect your organization.

2019-11-14 14:42:00 UTC
The Daily Swig
The Daily Swig
National Cyber League: Ethical hacking competition enters fall season with a bang

‘The way that you’re going to be able to hire effective new students is by how they handle these real-world scenarios’

2019-11-14 14:22:00 UTC
ThreatPost
ThreatPost
APT33 Mounts Focused, Highly Targeted Botnet Attacks Against U.S. Victims

The APT is using small botnets to take espionage aim at military and academic organizations.

Government Hacks Malware Advanced Persistent Threat APT33 Attacks Botnets Espionage Gas Highly Targeted Irán Military Targets Oil Trend Micro

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES