Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-06-26 14:13:00 UTC
ThreatPost
ThreatPost
Second Florida City Pays Hackers $500k Post-Ransomware Attack

After being hit by a ransomware attack, the second Florida city this month has opted to pay hackers their requested ransom.

Government Hacks Malware Atlanta Ransomware Baltimore Ransomware Lake City Malware Malware Attack Ransom Ransomware Ransomware Attack Riviera Beach Security City
2019-06-26 13:52:00 UTC
The Daily Swig
The Daily Swig
AWS debuts traffic monitoring tech for private clouds

Virtual fiber tap

2019-06-26 12:46:00 UTC
The Daily Swig
The Daily Swig
Six arrested in connection with $27m typosquatting scam

Fake crypto-exchange site thought to have claimed 4,000 victims in 12 countries

2019-06-26 11:13:00 UTC
HackRead
HackRead
7 Easy-to-Use Java Performance Tuning Tips

By Owais Sultan

Are you looking for easy-to-use Java performance tuning tips because you want to learn more developer knowledge and experience because of the current over-complicated process of optimization techniques? With a bit of practice, there are a few easy ways to learn best practices that allow you to build and optimize a well-designed and executed application. […]

This is a post from HackRead.com Read the original post: 7 Easy-to-Use Java Performance Tuning Tips

Technology News Application Java Javascript Programming Technology
2019-06-26 11:05:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Hacker threw Molotov cocktail, dropped USB drive of his DDoS deeds

Those things drop out of pockets at the worst times. Like, say, when you're hurling a bomb at a brick-and-mortar that you've also DDoSed.

Denial Of Service Law & Order Security Threats Anonymous DDoS Extortion FIFA Hacking Collectives Thumb Drive USB Drive
2019-06-26 10:54:00 UTC
The Daily Swig
The Daily Swig
Free tool makes it easy for researchers to ‘pillage’ Jenkins server data

Manual exfiltration is so last year

2019-06-26 10:50:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Social engineering forum hacked, user data dumped on rival site

Social Engineered, dedicated to the “Art of Human Hacking,” was gutted, with 55,121 users' details leaked on the same day as the hack.

Data Loss Security Threats Social Networks Vulnerability CMS Doxxing Hackers Hacking Hackers JavaScript MD5 MyBB Rce Remote Code Execution Social Engineering Web Application Frameworks XSS
2019-06-26 10:49:00 UTC
Naked Security | Sophos
Naked Security | Sophos
VLC media player gets biggest security update ever

Maintainers of the world’s most popular open source media player, VLC, has issued the biggest single set of security fixes in the program’s history.

Security Threats Vulnerability Bug Bounties Flaws FOSSA VideoLAN VLC
2019-06-26 10:47:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google creates educational tools to help kids spot fake news

Google has expanded its internet safety guide for children with techniques and games to help them be more info-literate online.

Google Fake News Keeping Our Kids Safe Online
2019-06-26 10:39:00 UTC
HackRead
HackRead
How Phishing Has Evolved in 2019

By David Balaban

Phishing attacks host every kind of malware and ransomware attack but what’s worse is that these attacks are on the rise. Starting in 2012, ransomware took the Internet by storm, thanks to latest phishing techniques. Unsuspecting and unprepared users, both individuals and businesses, found their screens frozen, their data no longer their own, and the […]

This is a post from HackRead.com Read the original post: How Phishing Has Evolved in 2019

Cyber Attacks Cyber Crime Security Antivirus Software Cybera Phishing Ransomware Spear Phishing

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring