Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-11-06 21:24:00 UTC
ThreatPost
ThreatPost
Rogue Trend Micro Employee Sold Customer Data for 68K Accounts

Trend Micro customers whose data was sold are getting scam calls from criminals purporting to be support staff.

Breach Hacks Cybercriminal Data Breach Insider Threat Rogue Employee Scam Scam Support Call Trend Micro
2019-11-06 19:00:00 UTC
Dark Reading
Dark Reading
Social Media: Corporate Cyber Espionage's Channel of Choice

Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage.

2019-11-06 16:52:00 UTC
ThreatPost
ThreatPost
Facebook Privacy Breach: 100 Developers Improperly Accessed Data

Facebook said that 100+ third-party app developers had access to restricted data for members of Groups, in its latest privacy snafu.

Facebook Privacy Cambridge Analytica Data Access Data Privacy Data Security Developers Facebook $5 Billion Facebook Fine FTC FTC Fine Groups Api Improper Access Names Profile Picture
2019-11-06 16:33:00 UTC
The Daily Swig
The Daily Swig
OWASP security projects showcased at All Day DevOps conference

SAMMv2, Juice Shop, and testing guide among topics covered during 24-hour security event

2019-11-06 16:26:00 UTC
ThreatPost
ThreatPost
DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks

The group was exposed after a ShadowBrokers leak.

Government Malware Advanced Persistent Threat Apt Darkuniverse Espionage Highly Targeted Itaduke Kaspersky Malware Analysis ShadowBrokers Leak. Spy Campaign
2019-11-06 15:00:00 UTC
Dark Reading
Dark Reading
The Uphill Battle of Triaging Alerts

Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it.

2019-11-06 14:30:00 UTC
ThreatPost
ThreatPost
Emotet Resurgence Continues With New Tactics, Techniques and Procedures

Since Emotet came out of hibernation last month, researchers are seeing the banking trojan's authors take on a consistent trend of new evasion tactics and social engineering techniques.

Hacks Malware Podcasts Emotet Malware Old Email Conversations Return Self Propagation Stolen Email Credentials Summer Hiatus
2019-11-06 14:26:00 UTC
The Daily Swig
The Daily Swig
Coalfire arrests: Charges against US pen testers reduced but not dropped

Security consultancy went outside scope of contract, claims sheriff

2019-11-06 14:00:00 UTC
ThreatPost
ThreatPost
Google Analytics Emerges as a Phishing Tool

Web analytics help phishers hone their attacks -- but website defenders can also use these tactics to better detect the scope of attacks and mitigate their effects.

Web Security Akamai Bing Cybercriminals Google Analytics Hackers Malicious Activity Phishing Phishing Tool Site Visitor Behavior Web Analytics Websites Yandex
2019-11-06 14:00:00 UTC
ThreatPost
ThreatPost
Presentation Template: Build Your 2020 Security Plan

The 2020 Security Plan PPT template helps security professionals engage their organization's decision-makers and gets their backing for critical security decisions.

Vulnerabilities CIOs CISOs Cyberattack Definitive 2020 Security Plan PPT Template Zero Day Exploits

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES