Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-07-24 10:32:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Facebook admits to Messenger Kids security hole

A hole in the supposed closed-loop messaging system allowed children to join group chats with people their parents hadn’t approved.

Facebook Privacy Social Networks Children Online Facebook Messenger Ico Information Commissioner's Office Messenger For Kids Online Privacy
2019-07-24 09:06:00 UTC
The Daily Swig
The Daily Swig
Tokyo 2020 Olympics: Network defenders have 365 days to secure sites and systems

There’s one year to go until the Summer Olympics opening ceremony. Security teams will need 20/20 vision ahead of the world’s biggest sporting event

2019-07-23 20:45:00 UTC
Dark Reading
Dark Reading
Business Email Compromise: Thinking Beyond Wire Transfers

As BEC continues to drive record-high losses, cybercriminals devise new tactics for swindling corporate targets out of millions.

2019-07-23 20:22:00 UTC
ThreatPost
ThreatPost
Citrix Confirms Password-Spraying Heist of Reams of Internal IP

Security experts say the attack stemmed from weak cybersecurity controls.

Breach Cloud Security Hacks 6tb Citrix Cybersecurity Controls Data Breach Update Data Heist Information Theft Intellectual Property Internal Ip Password Spraying
2019-07-23 19:30:00 UTC
ThreatPost
ThreatPost
WordPress Plugin Flaws Exploited in Ongoing Malvertising Campaign

An ongoing malvertising campaign is exploiting WordPress plugin vulnerabilities to redirect website visitors to malicious pages.

Hacks Vulnerabilities Web Security Coming Soon Page & Maintenance Mode plugin Critical Flaw Malvertising Campaign Vulnerability Wordpress Wordpress Flaw Wordpress Plugin Yellow Pencil Plugin
2019-07-23 19:28:00 UTC
Ars Technica
Ars Technica
Judge allows suit against AT&T after $24 million cryptocurrency theft

It's usually not possible to reverse fraudulent cryptocurrency transactions.

Policy AT&T Blockchain Cryptocurrency Security
2019-07-23 18:55:00 UTC
Dark Reading
Dark Reading
Bug Bounties Continue to Rise as Google Boosts its Payouts

Reward for vulnerability research climbed 83% in the past year.

2019-07-23 18:55:00 UTC
Ars Technica
Ars Technica
Tech firms “can and must” put backdoors in encryption, AG Barr says

He's tired of "dogmatic announcements that lawful access simply cannot be done."

Policy Attorney General Backdoors Encryption Security
2019-07-23 18:36:00 UTC
ThreatPost
ThreatPost
Malware-Loader ‘Brushaloader’ Grows More Menacing

Dropper malware become more popular as hackers turn to more quiet attack techniques to avoid detection.

Malware Brushaloader DataBot Dropper Malware Gootkit Loader Malware Narwhal Spider Nymaim TA544 Ursnif
2019-07-23 17:28:00 UTC
Dark Reading
Dark Reading
Russia Attempted to De-Anonymize Tor Browser: Report

An attempt to crack Tor was one of many projects hackers discovered when they broke into Russian intelligence contractor SyTech.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring