Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-07 11:34:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Don’t fall for fake Equifax settlement sites, warns FTC

Equifictitious sites popped up within days of Equifax agreeing to pay up to $700m to settle claims over the 2017 data breach.

Data Loss Breach Equifax Fake Settlement Sites Ftc
2019-08-07 11:30:00 UTC
ThreatPost
ThreatPost
Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids

Several serious privacy flaws in a kid's tablet were disclosed this year at Black Hat, which could allow a bad actor to track or send messages to children.

Black Hat Mobile Security Black Hat 2019 Kid's Tablet Las Vegas Leapfrog Tablet Security Man In The Middle Privacy Tablet Tablet Security
2019-08-07 10:57:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Banking PINs exposed in Monzo secure storage slip-up

When is a secure PIN not a secure PIN? When you accidentally store it in your log files.

Data Loss Privacy Monzo Online Banking PINs
2019-08-07 10:51:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Latest Android patches fix critical ‘QualPwn’ Wi-Fi flaws

The August 2019 security bulletin is out - and two of the critical flaws could allow an attacker to compromise the Android system kernel.

Android Vulnerability Patching QualPwn Tencent Wi-fi
2019-08-06 23:20:00 UTC
Dark Reading
Dark Reading
New Speculative Execution Vulnerability Gives CISOs a New Reason to Lose Sleep

The vulnerability, dubbed SWAPGS, is an undetectable threat to data security, similar in some respects to Spectre and Meltdown.

2019-08-06 23:00:00 UTC
Dark Reading
Dark Reading
US Air Force Bug Bounty Program Nets 54 Flaws for $123,000

The Air Force brought together 50 vetted hackers to find the vulnerabilities in the latest bug-bounty program hosted by a branch of the US military.

2019-08-06 22:15:00 UTC
Dark Reading
Dark Reading
Russian Attack Group Uses Phones & Printers to Breach Corporate Networks

Microsoft spotted Strontium, also known as APT28 or Fancy Bear, using IoT devices to breach businesses and seek high-value data.

2019-08-06 21:15:00 UTC
Dark Reading
Dark Reading
Ongoing Campaign Spoofs Walmart, Dating, Movie Sites

A new investigation detects more than 540 domain names linked to the Walmart brand and camouflaged as career, dating, and entertainment websites.

2019-08-06 21:01:00 UTC
The Daily Swig
The Daily Swig
Black Hat Briefings: Assessing the impact of last year’s pioneering security research

On the eve of the Black Hat 2019 Briefings sessions, The Daily Swig takes a closer look at the real-world impact of the security research that’s showcased in the desert each year

2019-08-06 20:25:00 UTC
ThreatPost
ThreatPost
Democrats and Doctors Behind Latest Wave of Leaked Data

Patient medical history and over 6 million email addresses tied to Democrats were detailed in a misconfigured storage buckets over the past few weeks.

Privacy Vulnerabilities Amazon Amazon S3 Bucket Data Breach Data Leak Medical Data Leak Misconfigured Bucket Personal Identifiable Information

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring