Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-09-26 13:00:00 UTC
ThreatPost
ThreatPost
CISOs: Support Vendor Security Ops for Best Cloud Results

Despite CISOs' apprehension about increasing dependence on SaaS applications and the security risks the cloud represents, adoption isn’t slowing down.

Cloud Security Vulnerabilities CISOs NIST Password Policy Passwords SaaS
2019-09-26 12:04:00 UTC
The Daily Swig
The Daily Swig
Esports gaming skills pave the way for cybersecurity careers

The soft skills developed by gamers are no longer being ignored by the security industry

2019-09-26 12:00:00 UTC
ThreatPost
ThreatPost
Cyber-Risk Business Cases: Using Economic Impact to Justify TIG Investment

How to determine -- and communicate -- the value of Threat Intelligence Gateways (TIGs) in your enterprise.

InfoSec Insider Cyber Risk Use Cases Fair Framework Gartner Infosc Insider Jack Freund Leveraging Threat Intel Purchase Justification Risklens Threat Intelligence Gateways Threat Intelligence Sharing Tig
2019-09-26 11:47:00 UTC
ThreatPost
ThreatPost
Chrome Bug, Not Avid Software, Causes Damage to MacOS File Systems

Users scrambled to find a fix for the problem and eventually Google took responsibility for the issue.

Vulnerabilities Apple Avid Avid Media Composer Chrome Facebook File Systems Google MacOS Social Media Unix Video Editing
2019-09-26 10:37:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Hackers are infecting WordPress sites via a defunct plug-in

If you're a Wordpress admin using a plug-in called Rich Reviews, you'll want to uninstall it. Now.

Malware Security Threats Automattic Github Malware Nuanced Media Plug-ins Rich Reviews Rich Reviews Plug-in Wordfence Wordpress
2019-09-26 10:27:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Russian pleads guilty in massive JPMorgan hacking scheme

Andrei Tyurin is the first to be convicted in one of the largest thefts of customer data from a single US financial institution in history.

Data Loss Law & Order Security Threats Andrei Tyurin Breach Cyberattacks Gery Shalon Guilty Plea Hacking Joshua Samuel Aaron JPMorgan Pump And Dump Russia Securities Fraud Ziv Orenstein
2019-09-26 10:16:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Update ColdFusion now! Emergency patch for critical flaws

Adobe has rushed out fixes for three vulnerabilities in its ColdFusion web development platform, two of which have been given the top billing of ‘critical’.

Adobe Security Threats Vulnerability Adobe ColdFusion Critical Flaw
2019-09-26 10:12:00 UTC
HackRead
HackRead
AI Leaps into Banking: When to know You Can Trust It

By Uzair Amir

Banking is readily recognized as one of the main sectors undergoing significant transformation with the advent of AI (Artificial Intelligence).

This is a post from HackRead.com Read the original post: AI Leaps into Banking: When to know You Can Trust It

Technology News AI Artificial Intelligence Banking Internet Technology
2019-09-26 09:47:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Vimeo sued for storing faceprints of people without their say-so

The suit was filed under BIPA, the Illinois law that requires written consent to grab people's faceprints - the same law Facebook's battling.

Law & Order Machine Learning Privacy AI Artificial Intelligence Biometric Information Privacy Act Biometrics BIPA Face Tagging Facebook Faceprints Facial Recognition Illinois Lawsuit Magisto Photo Tagging Vimeo
2019-09-26 00:28:00 UTC
Krebs on Security
Krebs on Security
Interview With the Guy Who Tried to Frame Me for Heroin Possession

In April 2013, I received via U.S. mail more than a gram of pure heroin as part of a scheme to get me arrested for drug possession. But the plan failed and the Ukrainian mastermind behind it soon after was imprisoned for unrelated cybercrime offenses. That individual recently gave his first interview since finishing his jail time here in the states, and he's shared some select (if often abrasive and coarse) details on how he got into cybercrime and why. Below are a few translated excerpts.

Ne'er-Do-Well News Flashpoint Fly Flycracker MUXACC1 Pauch Sergei Vovnenko

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES