Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-20 15:09:00 UTC
ThreatPost
ThreatPost
Adwind Spyware-as-a-Service Attacks Utility Grid Operators

A phishing campaign targeting utility grid operators uses a PDF attachment to deliver spyware.

Malware Web Security Adwind Antivirus Bypass Cofense Malware As A Service Pdf Spoof Phishing Campaign Spyware Utility Operators
2019-08-20 14:55:00 UTC
Dark Reading
Dark Reading
Cyberthreats Against Financial Services Up 56%

Financial institutions interacting with customers online must prepare for a broader, more sophisticated variety of threats.

2019-08-20 14:00:00 UTC
Dark Reading
Dark Reading
Who Gets Privileged Access & How to Enforce It

Let's begin by re-evaluating IT infrastructures to determine who has access to what, why, and when.

2019-08-20 13:56:00 UTC
The Daily Swig
The Daily Swig
Surviving the storm: What to do in a security meltdown

Businesses that fail to plan for a cyber incident can pay a heavy price, but more examples of good practice are emerging, says Stephen Pritchard

2019-08-20 12:42:00 UTC
The Daily Swig
The Daily Swig
‘Kaspersky-in-the-Middle’ bugs triaged

UXSS flaw raises concerns about security software intercepting encrypted connections

2019-08-19 20:59:00 UTC
ThreatPost
ThreatPost
VLC Media Player Allows Desktop Takeover Via Malicious Video Files

VideoLAN has released an updated version of its VLC Player to fix over a dozen bugs.

Malware Vulnerabilities Desktop Takeover Malicious Video File MKV Open Source Tracker Torrent Videolan VLC Player Vulnerability
2019-08-19 20:46:00 UTC
ThreatPost
ThreatPost
Apple Sues Corellium Over iOS ‘Replica’ Security Testing Software

The phone company has sued the startup for copyright infringement.

Mobile Security Apple Apple Lawsuit Bug Bounty Corellium Ios IPhone Startup Virtual Vulnerability Disclosure
2019-08-19 19:49:00 UTC
ThreatPost
ThreatPost
Post GandCrab, Cybercriminals Scouring the Dark Web for the Next Top Ransomware

A detailed look at underground forums shows that cybercriminals aren't sure where to look on the heels of the GandCrab ransomware group shutting its doors - and low-level actors are taking advantage of that by developing their own strains.

Black Hat Featured Malware Videos Atlanta Ransomware DEF CON GandCrab Malware Ransom Ransomware Ransomware Attack Ransomware Texas SamSam
2019-08-19 19:49:00 UTC
ThreatPost
ThreatPost
Post-GandCrab, Cybercriminals Scouring the Dark Web for the Next Top Ransomware

A detailed look at underground forums shows that cybercriminals aren't sure where to look on the heels of the GandCrab ransomware group shutting its doors - and low-level actors are taking advantage of that by developing their own strains.

Black Hat Featured Malware Videos Atlanta Ransomware DEF CON GandCrab Malware Ransom Ransomware Ransomware Attack Ransomware Texas SamSam
2019-08-19 19:15:00 UTC
Dark Reading
Dark Reading
Towns Across Texas Hit in Coordinated Ransomware Attack

The state government and cybersecurity groups have mobilized to respond to a mass ransomware attack that simultaneously hit 23 different towns statewide.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring