Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-07 18:20:00 UTC
ThreatPost
ThreatPost
Black Hat 2019: Security’s Powerful Cultural Transformation

Dino Dai Zovi, mobile security lead at Square, discusses ongoing transformation in security's role in the workplace during the keynote.

Black Hat Cloud Security Featured Vulnerabilities Web Security Black Hat 2019 Cultural Change DevOps Dino Dai Zovi Keynote New Roles Organizational Change Security Teams Square Transformation
2019-08-07 18:16:00 UTC
Ars Technica
Ars Technica
Self-driving car service open sources new tool for securing firmware

FwAnalyzer provides continuous automated analysis of firmware images.

Biz & IT Firmware Security
2019-08-07 16:45:00 UTC
HackRead
HackRead
Top Dangers That Online Gamers Face

By David Balaban

Given the huge numbers, it comes as no surprise that cybercriminals and other malicious elements are increasingly zeroing in on gamers

This is a post from HackRead.com Read the original post: Top Dangers That Online Gamers Face

Gaming Malware Security Gaming Phishing Security
2019-08-07 14:51:00 UTC
ThreatPost
ThreatPost
Smominru Cryptominer Scrapes Credentials for Half-Million Machines

The adversaries have retooled with EternalBlue and credential theft to add a new "access mining" revenue stream.

Hacks Malware Vulnerabilities Web Security Access Mining Carbon Black Cryptomining Dark Web EternalBlue RAT Selling Access Smominru
2019-08-07 14:18:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Don’t let the crooks ‘borrow’ your home router as a hacking server

Crooks don't have to break *into* your network to benefit - they can bounce *off* it so you take the blame and look like a hacker yourself.

Botnet Malware Cybersecurity Hacking Home Router Malware Ssh
2019-08-07 14:00:00 UTC
Dark Reading
Dark Reading
Rethinking Website Spoofing Mitigation

Deception technology is evolving rapidly, making it easier for organizations to turn the tables on their attackers. Here's how.

2019-08-07 13:55:00 UTC
ThreatPost
ThreatPost
New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses

Researchers demonstrate a new side-channel attack that bypass mitigations against Spectre and Meltdown.

Hacks Vulnerabilities CPU CVE-2019-1125 Intel Spectre Meltdown Microprocessor Side-channel Attack SWAPGS
2019-08-07 12:37:00 UTC
The Daily Swig
The Daily Swig
Security of popular kids’ tablet ‘quite concerning’, researchers find

Developers of the LeapPad Ultimate have since issued fixes

2019-08-07 12:04:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Scammers recruiting money mules on dating sites is on the rise, says FBI

It's not longer enough to be wary of flash-in-the-pan "lovers" who ask you to send money; now they're asking you to open accounts for them.

Law & Order Confidence Scams Dating Sites FBI IC3 Money Laundering Money Mules Online Dating Romance Scams
2019-08-07 11:56:00 UTC
ThreatPost
ThreatPost
Security Vulnerabilities Are Increasingly Putting Kids at Risk

A kid's tablet with security vulnerabilities is only the latest privacy faux pas in a children's connected device.

IoT Videos Vulnerabilities Connected Device Data Privacy Kids Tech Device Leapfrog Man In The Middle Attack Security Vulnerability

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring