Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-05-22 10:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Don’t break Windows 10 by deleting SID, Microsoft warns

Sometimes it's best not to tinker under the hood - especially when it comes to security IDs.

Microsoft Operating Systems Organisations Windows Permissions Security ID Windows 10 Windows Security Windows SIDS
2019-05-22 09:48:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Most hackers for hire are scammers, research shows

Google & UC San Diego researchers found that only 5 of 27 hacker-for-hire services actually launched attacks against their targets.

2-factor Authentication Google Phishing Security Threats 2FA Email Hacking Email Hijacking Gmail Hack For Hire Hackers For Hire Hijacked Accounts Honey Pots Phishing RAT Research Social Engineering Spearphishing Spoofed Websites Yahoo
2019-05-22 09:48:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Hackers for hire – the good, the bad and the just-plain-scammers

Google & UC San Diego researchers found that only 5 of 27 hacker-for-hire services actually launched attacks against their targets.

2-factor Authentication Google Phishing Security Threats 2FA Email Hacking Email Hijacking Gmail Hack For Hire Hackers For Hire Hijacked Accounts Honey Pots Phishing RAT Research Social Engineering Spearphishing Spoofed Websites Yahoo
2019-05-21 23:00:00 UTC
Dark Reading
Dark Reading
Satan Ransomware Adds More Evil Tricks

The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.

2019-05-21 22:42:00 UTC
HackRead
HackRead
Database with millions of Instagram influencers’ info leaked online

By Uzair Amir

The leaked database was discovered on Shodan on May 14th. A huge online database containing private contact information including phone numbers and email IDs of roughly 50 million Instagram profiles including those of influencers and brands has reportedly been discovered by security researcher Anurag Sen. The affected individuals include famous food bloggers and celebrities too […]

This is a post from HackRead.com Read the original post: Database with millions of Instagram influencers’ info leaked online

Leaks Security Amazon AWS Chtrbox India Instagram LEAKS Privacy
2019-05-21 21:21:00 UTC
ThreatPost
ThreatPost
Mozilla Tackles Two Critical Flaws with Firefox 67 Release

Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox, which touts better speed and privacy.

Privacy Vulnerabilities Web Security Browser Browser Fingerprinting Cryptomining Firefox Google Chrome Mozilla Mozilla Browser US-CERT
2019-05-21 21:02:00 UTC
ThreatPost
ThreatPost
Intel Fixes Critical, High-Severity Flaws Across Several Products

Intel issued fixes for a slew of vulnerabilities across several products - including a critical flaw enabling privilege escalation in its converged security and management engine (CSME).

Vulnerabilities Converged Security And Management Engine Critical Flaw CSME CVE-2019-0153 High Severity Flaw Intel Intel Flaw Intel Patch Intel Products Privilege Escalation Vulnerabilities
2019-05-21 20:50:00 UTC
Ars Technica
Ars Technica
Windows 10 May 2019 Update now rolling out to everyone… slowly

Unless you explicitly want it installed, you probably won't get this update.

Tech Microsoft Security Updates Windows Windows 10 Windows Update
2019-05-21 20:16:00 UTC
ThreatPost
ThreatPost
Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world.

Breach Cloud Security Critical Infrastructure Featured Privacy Videos Vulnerabilities Webinars Amazon Best Practices Cloud Controls Cloud Security Alliance Cloud Services Cybersecurity Data Protection Data Security Jim Reavis Misconfiguration Risk Management Salesforce Sean Cordero Shared Responsibility Model
2019-05-21 18:30:00 UTC
Dark Reading
Dark Reading
To Narrow the Cyber Skills Gap with Attackers, Cut the Red Tape

Attackers are getting further ahead, and entrenched corporate rules shoulder much of the blame.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring