Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-06-13 21:40:00 UTC
Dark Reading
Dark Reading
Cyberattack Hits Aircraft Parts Manufacturer

Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.

2019-06-13 20:15:00 UTC
Dark Reading
Dark Reading
Congress Gives 'Hack Back' Legislation Another Try

Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks.

2019-06-13 19:33:00 UTC
ThreatPost
ThreatPost
Evernote Critical Flaw Opened Personal Data of Millions to Attack

Evernote's web clipper extension for Chrome is vulnerable to a critical flaw that could have exposed the data of more than 4.6 million users.

Vulnerabilities Web Security Chrome Browser Critical Vulnerability Cross Site Scripting Attack Evernote Evernote Extension Proof Of Concept
2019-06-13 18:41:00 UTC
ThreatPost
ThreatPost
Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk

The critical bug in a connected medical device can allow an attacker to remotely manipulate hospital pumps, either to withhold meds or dispense too much.

Critical Infrastructure IoT Vulnerabilities 10/10 Alaris Alaris Medical Gateway BD Connected Device Critical Gateway Infusion Pump Medical Device Vulnerability
2019-06-13 18:30:00 UTC
HackRead
HackRead
How to Remove Temporary Files In Windows 10?

By Owais Sultan

Over time, temporary files can accumulate and take up storage space. If you want to free up storage space, you can delete temporary files – Here’s how to remove temporary files in Windows 10. Temporary files, which are usually referred to as Temp files, are junk files that are left behind after you have completed […]

This is a post from HackRead.com Read the original post: How to Remove Temporary Files In Windows 10?

How To Microsoft Data Technology Windows Windows 10
2019-06-13 17:30:00 UTC
Dark Reading
Dark Reading
7 Truths About BEC Scams

Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.

2019-06-13 15:04:00 UTC
ThreatPost
ThreatPost
Telegram CEO Fingers China State Actors for DDoS Attack

Durov took to Twitter to hint that Beijing tried to take Telegram offline to disrupt the Hong Kong protests.

Government Web Security China DDoS Hong Kong Protests Pavel Durov Secure Messaging State Actors Telegram Twitter
2019-06-13 14:35:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Facebook keeps deepfake of Mark Zuckerberg

"Whoever controls the data, controls the future," says the evil Zuck, who, according to the platform's current policy, won't be taken down.

Celebrities Facebook Fake News Social Networks 2016 US Presidential Campaign Deepfakes Fact Checkers Fake News Instagram Mark Zuckerberg
2019-06-13 14:30:00 UTC
Dark Reading
Dark Reading
The Rise of "Purple Teaming"

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

2019-06-13 14:30:00 UTC
Dark Reading
Dark Reading
The Rise of 'Purple Teaming'

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring