Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

2019-01-23 20:00:00 UTC
Malware in Ad-Based Images Targets Mac Users

Researchers detected 191,970 bad ads and estimates that around 1 million users were impacted.

Malware Web Security Ad-based Malware Hack Mac Malvertising Malware Shlayer Trojan Steganography
2019-01-23 19:30:00 UTC
Dark Reading
Dark Reading
The Evolution of SIEM

Expectations for these security information and event management systems have grown over the years, in ways that just aren't realistic.

2019-01-23 18:17:00 UTC
Monero: Cybercrime’s Top Choice for Mining Malware

Illicit Monero-mining malware accounts for more than 4 percent of the XMR in circulation, and has created $57 million in profits for the bad guys.

Cryptography Malware Cryptomining Malware Monero Most Popular Profit Analysis Virtual Currency
2019-01-23 17:51:00 UTC
Krebs on Security
Krebs on Security
How the U.S. Govt. Shutdown Harms Security

The ongoing partial U.S. federal government shutdown is having a tangible, negative impact on cybercrime investigations, according to interviews with federal law enforcement investigators and a report issued this week by a group representing the interests of FBI agents. Even if lawmakers move forward on new proposals to reopen the government, sources say the standoff is likely have serious repercussions for federal law enforcement agencies for years to come.

One federal agent with more than 20 years on the job told KrebsOnSecurity that the shutdown "is crushing our ability to take the fight to cyber criminals."

The Coming Storm Alex Stamos Brian Fung Christopher Burgess FBI Agents Association FBIAA Patrick Gray Risky Business Podcast US Government Shutdown
2019-01-23 17:34:00 UTC
The Daily Swig
The Daily Swig
Incoming! techies given 10 days to lock down DNS servers

DNS ‘tampering campaign’ takes place amid ongoing government shutdown

2019-01-23 17:00:00 UTC
Dark Reading
Dark Reading
Google Creates Online Phishing Quiz

Google Alphabet incubator Jigsaw says knowing how to spot a phish plus two-factor authentication are the best defenses against falling for a phishing email.

2019-01-23 16:34:00 UTC
6 Signs of Successful Threat Hunting

Here are six tips to put threat hunters in the driver's seat so they can outsmart their adversaries.

Vulnerabilities Web Security Carbon Black CB Predictive Security Cloud Data Loss Prevention Systems Endpoint Protection FIREWALLS IDS Insider Threat Intrusion Detection Systems Intrusion Prevention Systems IPS NetFlow Outsider Threat Threat Hunter Web Filters
2019-01-23 16:23:00 UTC
‘Chaos’ iPhone X Attack Alleges Remote Jailbreak

The attack makes use of previously disclosed critical vulnerabilities in the Apple Safari web browser and iOS.

Mobile Security Vulnerabilities Web Security Apple Apple Safari Apple Updates Chaos Attack CVE-2019-6225 CVE-2019-6227 Exploit Ios Version 12.1.3 IPhone X Jailbreak Patch Proof Of Concept Qihoo 360 Qixun Zhao
2019-01-23 16:16:00 UTC
Popular free Android VPN apps on Play Store contain malware

By Waqas

If you want to ensure optimal privacy while surfing the web, a VPN (virtual private network) is the only reliable option. In this regard, a majority of web and smartphone users rely upon free VPN services, which according to the latest research is a risky step. In 2017, researchers identified that 38% of Android VPN apps on […]

This is a post from Read the original post: Popular free Android VPN apps on Play Store contain malware

Malware News Privacy Security Android DNS Google Leak Play Store Security VPN
2019-01-23 16:00:00 UTC
The Daily Swig
The Daily Swig
Google Chromium changes may break ad blockers

Proposed modifications to extension specs could be the end of plugins such as uBlock Origin

BreachAware Insight


Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

March 2024
TikTok Ban, Discord Bot Community Attack, and Telecom Company's Breach Resurgence.
Ah, the dramatic saga of TikTok in the United States! Picture this: a ban looming over TikTok, akin to a dark cloud threatening to rain on our digital parade. Congress is all up in arms, waving their "think of the children" banners while TikTok nervously checks its watch, wondering if it should start packing its bags for a forced sale. Meanwhile, nobody bats an eye at the plethora of Chinese gadge...

Weekly Summary

08 April 2024

A total of 7 breaches were found and analysed resulting in 2,399,513 leaked accounts containing a total of 20 different data types. The breaches found publicly and freely available included PandaBuy, Stealer Log 0447, Leadzen, FICO and Koroleva