Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-07-25 14:59:00 UTC
Naked Security | Sophos
Naked Security | Sophos
EvilGnome – Linux malware aimed at your desktop, not your servers

EvilGnome was written to target the comparatively small but committed community who use Linux on their laptops.

Podcast EvilGnome Linux Malware Shell Script
2019-07-25 14:00:00 UTC
Dark Reading
Dark Reading
Answer These 9 Questions to Determine if Your Data Is Safe

Data protection regulations are only going to grow tighter. Make sure you're keeping the customer's best interests in mind.

2019-07-25 12:13:00 UTC
Naked Security | Sophos
Naked Security | Sophos
New York City moves to protect citizens’ location data

New York City is considering a law that could stop cellphone carriers and smartphone app vendors from selling their location data.

Privacy App Privacy Location Data New York NYC Smartphone Data Telecomms
2019-07-25 11:59:00 UTC
Naked Security | Sophos
Naked Security | Sophos
You can probably be identified from your anonymized data

The idea of de-identifying data has been around for a while. However, a study published this week asserts that it’s even easier to re-identify information than we first thought.

GDPR Compliance Privacy Anonymizing De-identified Data Online Privacy Pii User Data
2019-07-25 11:50:00 UTC
The Daily Swig
The Daily Swig
Cyber crunch: 3.5m unfilled jobs in cybersecurity by 2021

Growing skills shortage will tax defenders, warns recruitment firm

2019-07-25 11:50:00 UTC
The Daily Swig
The Daily Swig
Cyber crunch: Security industry still struggling with talent shortage

Growing skills gap will tax defenders, warns recruitment firm

2019-07-24 21:55:00 UTC
ThreatPost
ThreatPost
Popular File-Sharing Service WeTransfer Used in Malicious Spam Campaigns

WeTransfer is being used by hackers to circumvent email gateways looking to zap malicious links.

Hacks Email Gateway Free File Sharing Services HTM HTML Malicious URL Microsoft Services Office365 Spam WeTransfer
2019-07-24 21:05:00 UTC
Dark Reading
Dark Reading
With Data Breach Costs, Time is Money

The sooner a company can detect and respond to an incident, the less likely they are to pay for it, a new IBM-Ponemon study finds.

2019-07-24 21:00:00 UTC
ThreatPost
ThreatPost
ThreatList: Human Error is Behind One Quarter of Data Breaches

Meanwhile, remediation times are ballooning to a year or more in the case of malicious attacks, according to Ponemon Institute.

Breach Most Recent ThreatLists Average Cost Cost Of A Data Breach Healthcare IBM Ponemon Reportm 2019 Time To Remediate
2019-07-24 20:39:00 UTC
Krebs on Security
Krebs on Security
Neo-Nazi SWATters Target Dozens of Journalists

Nearly three dozen journalists at a broad range of major publications have been targeted by a far-right group that maintains a Deep Web database listing the personal information of people who threaten their views. This group specializes in encouraging others to harass those targeted by their ire, and has claimed responsibility for dozens of bomb threats and "swatting" incidents, where police are tricked into visiting potentially deadly force on the target's address.

A Little Sunshine Ne'er-Do-Well News The Coming Storm Atomwaffen Division Carey Holzman Doxbin James Mason

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring