Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-09-13 17:30:00 UTC
Dark Reading
Dark Reading
6 Questions to Ask Once You’ve Learned of a Breach

With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.

2019-09-13 16:06:00 UTC
ThreatPost
ThreatPost
Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks

At every turn, the info-stealer uses legitimate services to get around normal email, endpoint and network defenses.

Facebook Malware Web Security Astaroth Attack Analysis Brazil Cofense Information Stealer Legitimate Services Phishing Campaign Spy Trojan Youtube
2019-09-13 14:00:00 UTC
Dark Reading
Dark Reading
Taking a Fresh Look at Security Ops: 10 Tips

Maybe you love your executive team, your security processes, tools, or strategy. Maybe you hate them. Whatever the situation, it's likely at some point that things will have changed.

2019-09-13 13:46:00 UTC
The Daily Swig
The Daily Swig
#SocialSec: Hot takes on this week’s biggest cybersecurity news (Sept 13)

Disquiet for some as DNS-over-HTTPS is readied for prime time; Apple hits back at Google over iPhone hack warning; and a parody music video tackles phishing head-on

2019-09-13 13:32:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Just how private are your browsing habits?

DNS-over-HTTPS sounds as though it should be safer than plain DNS, because of the "HTTPS" part - but not everyone is delighted about it...

Uncategorized DNS Https Naked Security Live
2019-09-13 13:30:00 UTC
ThreatPost
ThreatPost
North Korean Spear-Phishing Attack Targets U.S. Firms

Researchers warn that U.S. firms are being targeted with legitimate - but trojanized - documents that are often socially engineered to a tee.

Malware Web Security Attachment Attack Autumn Aperture Email Kimsuky Kodak FlashPix Malicious Document Malicious Email North Korea Nuclear Deterrance Phishing Social Engineer Spearphishing Trojan
2019-09-13 13:17:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Intel: SSH-stealing NetCAT bug not really a problem

There's another vulnerability in Intel chips, with another catchy name: NetCAT.

Intel Security Threats Vulnerability Data Direct I/O Intel Intel Chips Keystroke Timing Attack NetCAT
2019-09-13 12:50:00 UTC
ThreatPost
ThreatPost
News Wrap: IoT Radio Telnet Backdoor And ‘SimJacker’ Active Exploit

Threatpost editors Tara Seals and Lindsey O'Donnell talk about the top news stories of the week - from leaky databases to SIM card attacks.

Hacks IoT Malware Podcasts Backdoor Data Expose Database Elasticsearch Server IoT Security Podcast Sim Simjacker Telnet
2019-09-13 12:43:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Leaky database full of fake Groupon emails turns out to belong to crooks

Crooks made bogus accounts to buy tickets with fake credit cards, resold them to unsuspecting buyers, and left the database-o-fraud wide open.

Data Loss Security Threats Vulnerability Elasticsearch Fraud Groupon NeuroTicket Noam Rotem Ran Locar Ransom Ticketmaster Tickets TickPick VpnMentor
2019-09-13 11:45:00 UTC
ThreatPost
ThreatPost
Cybercriminals Adding Sophistication to BEC Threats

New tactics aimed at business executives and users are being used to reap greater reward from email based fraud, which continues to rise, researchers said.

Government Hacks Malware Web Security BEC Business Email Compromise Department Of Justice Email Email Threats Operation ReWired

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES