Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-08 20:00:00 UTC
ThreatPost
ThreatPost
Critical RCE Bug Found Lurking in Avaya VoIP Phones

The vulnerability is a decade old with a public exploit, yet remained unpatched in one of the phone giant's most popular models.

Black Hat Vulnerabilities Avaya Avaya 9600 Series IP Deskphone Black Hat 2019 Critical Vulverability Deskphone Eavesdropping Enterprise Exfiltrate Audio McAfee Public Exploit Remote Code Execution Unpatched VoIP
2019-08-08 18:31:00 UTC
The Daily Swig
The Daily Swig
Eyeballer: AI utility scours website screenshots for bug bounty candidates

Eyes down. Bingo!

2019-08-08 17:15:00 UTC
HackRead
HackRead
Meet AttackSurfaceMapper; new automated penetration testing tool

By Sudais

AttackSurfaceMapper penetration testing tool has been developed in Python 3.x, is compatible with all major operating systems.

This is a post from HackRead.com Read the original post: Meet AttackSurfaceMapper; new automated penetration testing tool

Security AttackSurfaceMapper Cyber Security Hacking Infosec Kali Linux Penetration Security
2019-08-08 14:45:00 UTC
The Daily Swig
The Daily Swig
SQL Injection flaw opened doorway to Starbucks’ accounting database

Barista twister

2019-08-08 14:45:00 UTC
The Daily Swig
The Daily Swig
SQL injection flaw opened doorway to Starbucks’ accounting database

Barista twister

2019-08-08 14:33:00 UTC
ThreatPost
ThreatPost
Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

Researchers were able to bypass Apple's FaceID using a pair of glasses with tape on the lenses.

Black Hat Hacks Apple Apple FaceID Biometrics Black Hat USA 2019 FaceID Liveness Detection
2019-08-08 14:01:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Update your iPhone – remote control holes revealed by researchers

You might not think your phone is as exposed as an internet server - but it's handling plenty of untrusted data from unknown sources!

Apple Vulnerability Exploit Google Hacking IPhone Project Zero Vulnerability
2019-08-08 14:00:00 UTC
ThreatPost
ThreatPost
Ransomware Sees Triple-Digit Spike in Corporate Detections

A pair of reports released at Black Hat mark the huge shift away from targeting consumers.

Black Hat Malware Black Hat 2019 Business Spike Consumer Infections Malware Malwarebytes Q2 2019 Infections Reports Ryuk Trends Vectra
2019-08-08 14:00:00 UTC
ThreatPost
ThreatPost
Phishing Attacks Enlist Amazon AWS, Microsoft Azure in Ploys

An ongoing campaign is hosting its phishing landing pages on enterprise-class public cloud storage services -- a nascent trend meant to throw defenders off.

Cloud Security Web Security Amazon AWS Enterprise Evasion Landing Pages Losting Ongoing Campaign Phishing Pages Proofpoint Public Cloud Services S3
2019-08-08 12:48:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Twitter may have shared your data with its ad partners without your permission

Some user data, such as country and device type, was exposed to some advertisers for over a year.

Privacy Twitter Uncategorized Bug Data Sharing Targeted Advertising User Data

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring