Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-06-05 21:23:00 UTC
ThreatPost
ThreatPost
Buggy Phishing Kits Allow Criminals to Cannibalize Their Own

The vulnerable kits also offer a point of entry to compromise legitimate website servers.

Hacks Vulnerabilities Web Security Akamai Code Reuse File Upload Vulnerability Kit Hijacking Open Source Phishing Kits Vulnerabilities Website Compromise
2019-06-05 20:39:00 UTC
ThreatPost
ThreatPost
440 Million Android Users Plagued By Extremely Obnoxious Pop-Ups

The mobile ad plugin, found in hundreds of Google Play apps, uses well-honed techniques from malware development to hide itself.

Malware Mobile Security Advertising Beitaplugin Cootek Lookout Security Malware Millions Of Downloads Mobile Security Out Of App Ads Plugin Pop-up Ads Smart Scan Touchpal
2019-06-05 19:43:00 UTC
ThreatPost
ThreatPost
Mozilla and Google Browsers Get Security, Anti-Tracking Boosts

Both FireFox and Chrome have received updates to better guard users against privacy and security threats, such as tracking by Facebook.

Breach Mobile Security Privacy Web Security Android Anti-tracking Chrome 75 Chrome Browser Facebook Firefox Firefox Browser Google Google Chrome Google Chrome Browser Lockbox Mozilla Firefox Mozilla Firefox Browser New Features Updates
2019-06-05 16:26:00 UTC
The Daily Swig
The Daily Swig
Safe harbor needs to be built to provide haven for ethical hackers

Companies offering a security bug bounty must include provisions to protect researchers

2019-06-05 15:08:00 UTC
The Daily Swig
The Daily Swig
Cyber Essentials: Five years on

UK gov’t looks to simplify security certification process for contract bidders

2019-06-05 14:14:00 UTC
ThreatPost
ThreatPost
BlueKeep ‘Mega-Worm’ Looms as Fresh PoC Shows Full System Takeover

A working exploit for the critical remote code-execution flaw shows how an unauthenticated attacker can achieve full run of a victim machine in about 22 seconds.

Vulnerabilities Bluekeep Cve-2019-0708 Exploit In The Wild Mega Worm Metasploit Module Nsa Warning Patch Remote Code Execution Windows Bug Zǝɹosum0x0
2019-06-05 14:08:00 UTC
ThreatPost
ThreatPost
Why Election Trust is Dwindling in a Post-Cambridge Analytica World

As more data is collected, shared and sold, people are growing increasingly distrustful of technology, an expert said at Infosecurity Europe Wednesday.

Featured Privacy Web Security Cambridge Analytica Dark Net Dark Web Data Data Mining Data Security Election Security Infosecurity Europe Political Tor Browser
2019-06-05 13:12:00 UTC
The Daily Swig
The Daily Swig
Vulnerability in Qlik analytics products can be exploited to read local files

Now-patched expression injection flaw opened the door to numerous exploits

2019-06-05 11:54:00 UTC
ThreatPost
ThreatPost
Infosecurity Europe: Easing the Clash Between IT and OT

Experts at Infosecurity Europe shed light on how IT and operational technology teams can better collaborate as industrial IoT takes hold.

Featured Malware Vulnerabilities IIoT Industrial IoT Infosecurity Europe IoT IT OT Operational Technology Shamoon Tritan
2019-06-05 11:33:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Patch Android! June 2019 update fixes eight critical flaws

It's that time again. June's patches for Android are here.

Android Google Mobile Operating Systems Vulnerability Elevation Of Privilege Flaws Patch Patching Pixel Rce Remote Code Execution

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring