Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-06-25 22:00:00 UTC
Dark Reading
Dark Reading
Global Cyberattack Campaign Hit Mobile Carrier Networks

A nation-state group possibly out of China has attacked cell carrier networks in search of data on high-value individuals.

2019-06-25 18:34:00 UTC
ThreatPost
ThreatPost
Newly-Discovered Malware Targets Unpatched MacOS Flaw

Researchers have found samples of malware that targets a recently-disclosed, unpatched MacOS vulnerability.

Hacks Malware Mobile Security Vulnerabilities Apple Bypass Vulnerability Exploit Mac Mac Flaw MacOS Malware Vulnerability
2019-06-25 18:00:00 UTC
Dark Reading
Dark Reading
How to Avoid Becoming the Next Riviera Beach

Be prepared by following these five steps so you don't have to pay a ransom to get your data back.

2019-06-25 17:49:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Serious Security: Rambleed attacks blunted – the OpenSSH way

Here's a way to keep secrets safe in memory, even in a world of hardware-level leakage due to tricks like Rambleed, Spectre and more.

Vulnerability Cryptography Openssh Rambleed Serious Security
2019-06-25 16:10:00 UTC
HackRead
HackRead
Cellular networks worldwide hit by hackers in espionage attempt

By Uzair Amir

Cybereason, an Israeli-US security firm based in Boston, has reported that certain nation-state hackers managed to compromise the systems of no less than ten cellular carriers across the globe to steal metadata of specific users. Without naming anyone, the company claims that the targeted users and the attackers both belong to China.  The campaign is […]

This is a post from HackRead.com Read the original post: Cellular networks worldwide hit by hackers in espionage attempt

Cyber Attacks Hacking News China Cyber Attack Cyber Warfare Espionage Hacking Security
2019-06-25 15:04:00 UTC
The Daily Swig
The Daily Swig
‘Velocity does not have to come at the cost of security’

The rising popularity of open source components doesn’t automatically make them the right choice

2019-06-25 15:01:00 UTC
ThreatPost
ThreatPost
Malspam Emails Blanket LokiBot, NanoCore Malware With ISO Files

A new malicious campaign is spreading LokiBot and NanoCore trojans under the guise of an ISO file claiming to be an invoice.

Hacks Malware Attachment ISO File LokiBot Malicious Email Malspam NanoCore
2019-06-25 14:29:00 UTC
HackRead
HackRead
Researchers exploit LTE flaws to send 50,000 fake presidential alerts

By Waqas

Researchers managed to cover a 50,000 seat football stadium using only four malicious portable stations. A group of security researchers from the University of Colorado Boulder has published a paper detailing the findings of their latest research revealing that LTE vulnerabilities can help attackers send out fake presidential alerts. To do this, they only need […]

This is a post from HackRead.com Read the original post: Researchers exploit LTE flaws to send 50,000 fake presidential alerts

Security Android IOS LTE Security Vulnerability
2019-06-25 14:28:00 UTC
Krebs on Security
Krebs on Security
Tracing the Supply Chain Attack on Android

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn't exactly name those responsible, but said it believes the offending vendor uses the nicknames "Yehuo" or "Blazefire." What follows is a deep dive into the identity of that Chinese vendor, which appears to have a long and storied history of pushing the envelope on mobile malware.

Breadcrumbs Ne'er-Do-Well News The Coming Storm Blazefire Chinese Software Developer Network Chuda Haagen Hagen Hsu Heng Hummer Trojan Shanghai Blazefire Network Technology Co Ltd. Shanghai Bronze Network Technology Co. Ltd. Shanghai Qianyou Network Technology Co. Ltd. Shanghai Tongjue Network Technology Co. Ltd. Shanghai Wildfire Network Technology Co. Ltd. Tosaka1027@gmail.com Triada Malware Wildfire Yehuo
2019-06-25 14:00:00 UTC
Dark Reading
Dark Reading
The Rise of Silence and the Fall of Coinhive

Cryptomining will exist as long as it remains profitable. One of the most effective ways to disrupt that activity is to make it too expensive to run cryptomining malware in your network.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring