Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-06-10 19:15:00 UTC
Dark Reading
Dark Reading
GoldBrute Botnet Brute-Forcing 1.5M RDP Servers

Botnets are scanning the Internet for servers exposing RDP and using weak, reused passwords to obtain access.

2019-06-10 17:39:00 UTC
ThreatPost
ThreatPost
How to Model Risk in an Apex Predator Cyber-World

Large-scale existential threats exist everywhere and can annihilate us with only trivial effort. Should we all throw everything we can at them?

Critical Infrastructure Government Hacks InfoSec Insider Advanced Threat Actors Apex Predators Apt Chronicle Security Corporate Risk Corporate Security Frequency Open Fair Probability Risk Risk Assessment Risk Modeling
2019-06-10 16:10:00 UTC
ThreatPost
ThreatPost
Microsoft Warns of Email Attacks Executing Code Using an Old Bug

The flaw affected all versions of Microsoft Office, Microsoft Windows and architecture types dating back to 2000, and was patched in November 2017.

Vulnerabilities Web Security Arbitrary Code Execution CVE-2017-11882 Email Campaign Equation Editor Malicious Rtf Files Microsoft
2019-06-10 15:55:00 UTC
HackRead
HackRead
China’s BGP rerouting leaves European mobile carriers stranded for 2 hours

By Uzair Amir

On Thursday, June 6th (9:43 am UTC), Europe’s leading mobile providers received a shock when a large chunk of the traffic destined to reach them was misdirected or rerouted to another path by the network of a Chinese state-operated telecom firm, China Telecom. The misdirection of the traffic continued for two hours and even more […]

This is a post from HackRead.com Read the original post: China’s BGP rerouting leaves European mobile carriers stranded for 2 hours

Security China Europe Google Internet Router Spotify
2019-06-10 15:33:00 UTC
The Daily Swig
The Daily Swig
Cast no shadow: History of darknet market takedowns is littered with OpSec fails

For all of the advancements that have been made in encryption and anonymization technology, basic operational security oversights remain a key factor in darknet market takedowns

2019-06-10 14:51:00 UTC
ThreatPost
ThreatPost
VLC Player Gets Patched for Two High-Severity Bugs

Popular media player receives 33 security bug fixes, two of which are rated high severity.

Hacks Vulnerabilities Apache Kafka Filezilla FOSSA Free And Open Source Software Audit Notepad++ Open Source Putty Reliable Internet Stream Transport Stack-buffer-overflow Bug Videolan Vlc VLC Media Player
2019-06-10 14:26:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Microsoft warns of time-travelling equation exploit – are you safe?

An Office bug that was squashed back in 2017 is still in widespread use - make sure your computer hasn't slipped through the patch cracks!

Malware Microsoft Vulnerability CVE-2017-11882 Equation Editor Exploit Vulnerability
2019-06-10 12:57:00 UTC
The Daily Swig
The Daily Swig
TorGuard takes legal action against rival NordVPN over blackmail allegations

VPN providers go head-to-head

2019-06-10 11:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
The GoldBrute botnet is trying to crack open 1.5 million RDP servers

Even its most optimistic users would have to concede that it’s been a bracing few weeks for anyone who relies on Microsoft’s Remote Desktop Protocol (RDP).

Security Threats Vulnerability BlueKeep CVE-2019-0708 GoldBrute NSA RDP Remote Desktop Services Windows 7 Windows XP
2019-06-10 11:05:00 UTC
The Daily Swig
The Daily Swig
New Firefox rules block extensions with obfuscated code

Updated add-on policy takes effect today

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring