Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-07-31 15:04:00 UTC
The Daily Swig
The Daily Swig
Bug Bounty Radar // July 2019

New web targets for the discerning hacker

2019-07-31 14:51:00 UTC
ThreatPost
ThreatPost
Trivial Bug Turns Home Security Cameras Into Listening Posts

Anyone can listen to the camera's audio over the internet.

IoT Privacy Vulnerabilities Amcrest Audio Streams CVE-2019–3948 Dashua Home Security Camera Ip Video Camera Remote Unauthenticated Attacker Trivial Bug Vulnerability
2019-07-31 14:00:00 UTC
Dark Reading
Dark Reading
8 Free Tools to Be Showcased at Black Hat and DEF CON

Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.

2019-07-31 14:00:00 UTC
Dark Reading
Dark Reading
The Attribution Trap: A Waste of Precious Time & Money

Aiming for attribution doesn't help most organizations become more secure. It can actually have the opposite effect.

2019-07-31 13:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
iMessage bug could have allowed attackers to read data from any iPhone

Google's Project Zero has unveiled details of a bug in Apple's iMessage that lets attackers read data from an iPhone without any user interaction.

Apple IOS Mobile Operating Systems Apple Patch Google Imessage Ios IPad IPhone IPods Natalie Silvanovich Project Zero
2019-07-31 13:11:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Georgia hit with malware yet again

The Department of Public Safety says it won't pay, but given the umpteen times the state's agencies have been hit, somebody's not listening.

Data Loss Government Security Law & Order Malware Ransomware Security Threats Georgia Malware Police Ransomware Ryuk SamSam
2019-07-31 13:00:00 UTC
ThreatPost
ThreatPost
Black Hat USA 2019 Preview

Threatpost editors discuss the top trends, keynotes and sessions that they look forward to at Black Hat USA and DEF CON 2019.

Black Hat IoT Malware Mobile Security Podcasts Black Hat 2019 Data Privacy Deep Fake DEF CON Iphone Las Vegas Mobile Security
2019-07-31 10:40:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Cyberattacks on connected cars could gridlock entire cities

It would require taking over and stranding 20% of a city's cars to freeze traffic, and only 10% to impede ambulances, physicists calculate.

Car Security IoT Security Threats Autonomous Cars Cars Connected Cars Internet Of Things Iot Vehicle Wifi
2019-07-31 09:54:00 UTC
The Daily Swig
The Daily Swig
OXID eShop pushes update to resolve critical vulnerabilities

RIPS Tech credited with discovering RCE flaw

2019-07-30 22:50:00 UTC
Dark Reading
Dark Reading
Container Security Is Falling Behind Container Deployments

Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring