Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-10-16 15:28:00 UTC
ThreatPost
ThreatPost
Docker Containers Riddled with Graboid Crypto-Worm

A worm with a randomized propagation method is spreading via the popular container technology.

Cloud Security Malware Container Technology Cryptomining Docker Graboid Malware Analysis Unit 42 Worm
2019-10-16 14:59:00 UTC
The Daily Swig
The Daily Swig
California expands data breach notification law to include passport and biometric data

Move may soon be echoed by more US states

2019-10-16 14:00:00 UTC
Dark Reading
Dark Reading
Federal CIOs Zero In on Zero Trust

Here's how federal CIOs can begin utilizing the security concept and avoid predictable obstacles.

2019-10-16 13:00:00 UTC
ThreatPost
ThreatPost
Podcast: Departing Employees Could Mean Departing Data

Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today.

Podcasts Privacy Data Privacy Data Security Insider Threat
2019-10-16 13:00:00 UTC
ThreatPost
ThreatPost
New Presentation Template: Incident Response Reporting for Management

For many security decision-makers, the real challenge is communicating the ongoing IR process to their management.

Breach Critical Infrastructure Malware Vulnerabilities Breach Incident Response Infosec IR Management Templates
2019-10-16 12:45:00 UTC
ThreatPost
ThreatPost
Cybercrime Tool Prices Bump Up in Dark Web Markets

A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.

Hacks Malware Web Security Black Market Cyber Criminals Cybercrime Dark Web Data Privacy DDoS Exploit Kits Flashpoint Ransomware
2019-10-16 12:27:00 UTC
ThreatPost
ThreatPost
Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector: Report

A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when the phone was encased by a third-party screen protector.

Hacks Authentication Authentication Bypass Biometrics Fingerprint Reader Galaxy S10 Samsung Samsung Phone Smartphone
2019-10-16 12:01:00 UTC
The Daily Swig
The Daily Swig
Domain squatting malfeasance ratchets up ahead of US presidential election

Typo traps promote rival candidates

2019-10-16 10:53:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Food writer Jack Monroe loses at least £5,000 in SIM-swap fraud

Her accounts were drained in spite of 2FA, underscoring the fact that SIM swaps are the easiest way around what's still a good security tool.

Celebrities Data Loss Hacked Law & Order Mobile Phishing Security Threats 2FA Hijacking Jack Monroe MFA Multi-factor Authentication Sim Swap Sim Swapping Social Engineering Two-factor Authentication
2019-10-16 10:25:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Pitney Bowes and Groupe M6 join ransomware’s victim list

Two more large organisations find themselves struggling after a ransomware attack...

Ransomware Security Threats Alphabroder GandCrab Groupe M6 Pitney Bowes Ransomware Sodinokibi

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES