Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-08 00:54:00 UTC
The Daily Swig
The Daily Swig
The service worker hiding in your browser

New tool easily backdoors vulnerable websites

2019-08-07 23:00:00 UTC
ThreatPost
ThreatPost
Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack

At Black Hat USA 2019, researchers showed how a previously-disclosed flaw on Windows systems that could allow arbitrary code execution could also impact Hyper-V.

Black Hat Cloud Security Vulnerabilities Azure Cloud Black Hat USA DEF CON Hyper-V Microsoft RDP Flaw
2019-08-07 22:57:00 UTC
ThreatPost
ThreatPost
Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks

Academic researchers carry out attacks on high-end commercial devices as well as narrowband IoT sensors.

Black Hat IoT Mobile Security 5G Altaf Shaik Attacks Battery Drain Bidding Down Black Hat 2019 Iot Sensors Man In The Middle Nb Iot Session Vulnerabilities
2019-08-07 22:43:00 UTC
Krebs on Security
Krebs on Security
Who Owns Your Wireless Service? Crooks Do.

Incessantly annoying and fraudulent robocalls. Corrupt wireless company employees taking hundreds of thousands of dollars in bribes to unlock and hijack mobile phone service. Wireless providers selling real-time customer location data, despite repeated promises to the contrary. A noticeable uptick in SIM-swapping attacks that lead to multi-million dollar cyberheists.

If you are somehow under the impression that you -- the customer -- are in control over the security, privacy and integrity of your mobile phone service, think again. And you'd be forgiven if you assumed the major wireless carriers or federal regulators had their hands firmly on the wheel.

A Little Sunshine The Coming Storm Aaron Mackey Andy Greenberg AT&T Eff Electronic Frontier Foundation Federal Communications Commission Gigi Sohn Google Voice Nicholas Truglia Robocalls SIM Swapping Wired
2019-08-07 22:00:00 UTC
The Daily Swig
The Daily Swig
Ancient technique tears a hole through modern web stacks at Black Hat 2019

PortSwigger’s James Kettle dusts off the request smuggling text books to demonstrate new ways of breaking through the web ecosystem

2019-08-07 20:31:00 UTC
ThreatPost
ThreatPost
Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights

From government surveillance to domestic abuse, technology is being used in new and disturbing ways that threaten human rights - how can the security industry fight back?

Black Hat IoT Vulnerabilities Black Hat USA 2019 Eva Galperin Human Rights Malware Schneier Spyware Surveillanceware
2019-08-07 20:02:00 UTC
The Daily Swig
The Daily Swig
JSShell takes cross-site scripting to new highs

XSS to RCE made easy

2019-08-07 20:00:00 UTC
Dark Reading
Dark Reading
North Korean Cyber Ops Reportedly Stole $2B to Fund Weapons Programs

Unlike many nations, North Korea often engages in cyber operations to generate much-needed cash for the country's coffers. In that respect, its hackers have been extremely successful.

2019-08-07 19:50:00 UTC
Dark Reading
Dark Reading
Enterprises Must Be Wary of Ransomware Targeting Network File Shares &Cloud Assets

New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.

2019-08-07 19:50:00 UTC
Dark Reading
Dark Reading
Enterprises Must Be Wary of Ransomware Targeting Network File Shares & Cloud Assets

New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring