Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSA lack of a Bluetooth Low Energy (BLE) pairing mechanism leaves the smart IoT devices open to malicious manipulation.
And that’s without GDPR
Increasingly complex attacks coupled with a shortage in skills and budget are worrying IT managers across the globe.
Humans are listening to our recordings - some made by mistake - to improve speech recognition. But they're not as anonymous as Google says.
Malware takes advantage of unpatched backup and storage systems
Malware takes advantage of unpatched backup and storage systems
This is either a minor controversy blown out of proportion, or the latest example of Microsoft’s disregard for its users’ wishes.
Apple disabled the app after somebody reported a bug - not exploited yet - that could allow an eavesdropper to listen in on another iPhone.
Changes in fundamental enterprise architectures coupled with shifts in human resources mean that companies are considering new risks to their infrastructure.
Some advanced persistent threat actors can spend north of $1 million on attacks, but the return on that investment can be huge.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.