Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-07-08 09:54:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Monday review – the hot 23 stories of the week

From RDP BlueKeep's message for admins to Medtronic's recall of hackable insulin pumps - and everything in between.

Weekly Summary Computer Security Infosec Monday Review News Security News Weekly Roundup
2019-07-05 21:29:00 UTC
ThreatPost
ThreatPost
Data Breach Lessons from the Trenches

How companies can identify their own insecure data, remediate data breaches and proactively secure data against future attacks.

Breach Cloud Security Vulnerabilities Webinars Breach Corporate Risk Data Breach Risk
2019-07-05 19:40:00 UTC
Dark Reading
Dark Reading
UK Forensics Firm Paid Ransom in Cyberattack

Victim firm Eurofins Scientific handles more than 70,000 criminal cases per year in the UK.

2019-07-05 19:27:00 UTC
ThreatPost
ThreatPost
WordPress Plugin WP Statistics Patches XSS Flaw

A cross-site scripting vulnerability in WordPress plugin WP Statistics could have enabled full website takeover.

Vulnerabilities Web Security Cross Site Scripting IP Sanitization Vulnerability Wordpress Wordpress Plugin Flaw
2019-07-05 18:40:00 UTC
Dark Reading
Dark Reading
Intelligent Authentication Market Grows to Meet Demand

Confidence in user identity is critical to prevent fraud and theft, and companies are looking for new ways to get the necessary assurance.

2019-07-05 17:05:00 UTC
ThreatPost
ThreatPost
PGP Ecosystem Targeted in ‘Poisoning’ Attacks

Two researchers are being singled out in what are called PGP poisoning or flood attacks that render the authentication tool unusable for victims.

Cryptography Hacks Privacy GnuPG OpenPGP OpenPGP Working Group Synchronizing Key Servers
2019-07-05 14:45:00 UTC
The Daily Swig
The Daily Swig
Mozilla revamps SSL Configuration Generator tool

Utility helps avoid technical headaches

2019-07-05 14:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
5 tips to stay secure on social media

Social media isn't for everyone, but lots of us love it - so here's how to be in it and win it.

Social Networks Video Facebook Instagram Social Media Social Networks Twitter
2019-07-05 12:56:00 UTC
The Daily Swig
The Daily Swig
‘This is how black hats are born’

Top infosec trends in the social media spotlight this week

2019-07-05 12:29:00 UTC
HackRead
HackRead
The Logic of a Classic Advanced Persistent Threat Attack

By David Balaban

Story of an Advanced Persistent Threat attack against a large corporation that started with a series of blank emails. Advanced persistent threats (APTs) are increasingly targeting enterprise networks nowadays. This article highlights a recent attack against a large, well-protected Australian organization that entailed a major data breach. It’s Monday, 12:55 p.m. In Sydney, Olivia Wilson […]

This is a post from HackRead.com Read the original post: The Logic of a Classic Advanced Persistent Threat Attack

Cyber Attacks Cyber Crime Security Advanced Persistent Threat APT Cyber Attack Hacking Security Vulnerability

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring