Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-01 12:03:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Researchers hack camera in fake video attack

Tampering with surveillance cameras is a common activity for Hollywood heroes and criminals alike. Now, researchers have shown how they can do it in real life.

IoT Security Threats Vulnerability Camera Hack Forescout Hacking Internet Of Things Iot IP Surveillance Cameras Surveillance Vulnerability
2019-08-01 11:00:00 UTC
Naked Security | Sophos
Naked Security | Sophos
North Carolina county falls for BEC scam, to the tune of $1,728,083

The county could only claw back some of the $2,504,601 it paid to a scammer posing as a contractor working on building a new high school.

Government Security Law & Order Phishing Security Threats BEC Scams Business Email Compromise Cabarrus County Fraud North Carolina Scam Spearphishing Whaling
2019-08-01 10:39:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Five Eyes nations demand access to encrypted messaging

The alliance wants tech companies to build backdoor access to users’ encrypted data, by force if necessary.

Apple Cryptography Facebook Law & Order Mobile Privacy Social Networks #nobackdoors Australia Backdoors Canada Encryption End-to-end Encryption Five Eyes FVEY Instagram Messenger New Zealand Terrorism UK US WhatsApp
2019-08-01 10:01:00 UTC
The Daily Swig
The Daily Swig
EU bug bounty equips FileZilla with fresh round of security patches

‘We appreciate the opportunity to be part of this program,’ says FTP application founder

2019-07-31 21:10:00 UTC
HackRead
HackRead
New Android ransomware uses pornographic posts to infect devices

By Uzair Amir

The new Android ransomware was initially spread through Reddit and XDA-Developers' forum.

This is a post from HackRead.com Read the original post: New Android ransomware uses pornographic posts to infect devices

Malware Security Android Play Store Ransomware Security WannaCry Windows
2019-07-31 20:43:00 UTC
ThreatPost
ThreatPost
Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware

The RIG exploit kit and Safari redirects are both in the adversaries' bag of tricks.

Malware Web Security Cisco Talos Mac Users Malvertising Campaigns Malware RIG Exploit Kit Safari Redirects Shlayer
2019-07-31 18:50:00 UTC
ThreatPost
ThreatPost
Honda’s Security ‘Soft Spots’ Exposed in Unsecured Database

A researcher said that he found a Honda ElasticSearch database exposing 40GB of internal system and device data.

Web Security Data Leak Elasticsearch Database Exposed Data Honda Honda Security Leaky Data
2019-07-31 18:00:00 UTC
Dark Reading
Dark Reading
Why the Network Is Central to IoT Security

Is there something fishy about your network activity? Better make sure all of your IoT devices are under control.

2019-07-31 16:43:00 UTC
Naked Security | Sophos
Naked Security | Sophos
‘Urgent/11’ flaws affect 200 million devices – from routers to elevators

There are 11 security flaws affecting VxWorks: “the most widely used operating system you may never have heard about”.

IoT Security Threats Vulnerability Internet Of Things Patching RTOS Urgent/11 VxWorks Wind River
2019-07-31 16:13:00 UTC
ThreatPost
ThreatPost
Chrome 76 Dumps Default Adobe Flash Player Support

In addition, Google’s latest Chrome version implements 43 new security fixes.

Privacy Vulnerabilities Web Security Adobe Adobe Flash Browser Chrome 76 Flash Player Google Google Chrome High Severity Flaw Patch Vulnerability

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring