Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-05-09 18:30:00 UTC
Dark Reading
Dark Reading
How to Close the Critical Cybersecurity Talent Gap

If we don't change our ways, the gap will keep getting worse. Outside-the-box thinking and new techniques are required, and here are a few ways to get started.

2019-05-09 17:06:00 UTC
ThreatPost
ThreatPost
Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked

Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password.

Cloud Security Vulnerabilities Web Security Alpine Docker Alpine Linux Docker Container CVE-2019-5021 Empty Password In Configuration File Github Linux PAM NULL Password
2019-05-09 16:37:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Sextortion mail from yourself? It doesn’t mean you’ve been hacked…

Here's a 30-second video you can show your friends and family if they freak out after receiving a scam email apparently from themselves...

Phishing Blackmail Email Sextortion Spoofing
2019-05-09 16:23:00 UTC
The Daily Swig
The Daily Swig
Growing percentage of breaches blamed on cyber spies and nation states

Leaky buckets, phishing, and malware take center stage in latest data breach report

2019-05-09 16:00:00 UTC
ThreatPost
ThreatPost
Serious Phar Flaw Allows Arbitrary Code Execution on Drupal

Drupal, Typo3 and Joomla are all impacted by the bug.

Vulnerabilities Web Security Arbitrary Code Execution Code Content Management System Cve-2019-11831 Drupal Joomla Path Traversal Phar Phar Stream Wrapper PHP Typo3
2019-05-09 14:49:00 UTC
ThreatPost
ThreatPost
Researchers in the Dark on Powerful LightNeuron Malware for Years

LightNeuron is the first to target Microsoft Exchange transport agents -- and is used as a hub for major Turla APT espionage efforts.

Government Malware Apt Backdoor Lightneuron Malware Analysis Microsoft Exchange Remote Code Execution Stealth Transport Agents Turla
2019-05-09 14:49:00 UTC
ThreatPost
ThreatPost
Researchers in the Dark on Powerful LightNeuron Malware, for Years

LightNeuron is the first to target Microsoft Exchange transport agents -- and is used as a hub for major Turla APT espionage efforts.

Government Malware Apt Backdoor Lightneuron Malware Analysis Microsoft Exchange Remote Code Execution Stealth Transport Agents Turla
2019-05-09 14:49:00 UTC
ThreatPost
ThreatPost
Researchers in the Dark on Powerful LightNeuron Malware, for Years

LightNeuron is the first to target Microsoft Exchange transport agents -- and is used as a hub for major Turla APT espionage efforts.

Government Malware Apt Backdoor Lightneuron Malware Analysis Microsoft Exchange Remote Code Execution Stealth Transport Agents Turla
2019-05-09 14:47:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Metal keys beat smart locks in NYC legal battle

A group of tenants in New York City have prevailed in a lawsuit against their landlord's use of smart locks.

IoT Law & Order Privacy Iot Latch Lawsuit New York Smart Home Smart Locks
2019-05-09 14:40:00 UTC
Naked Security | Sophos
Naked Security | Sophos
CSS tracking trick can monitor your mouse without JavaScript

A security researcher has demonstrated a new way to track mouse movements even if users block JavaScript.

Privacy Security Threats Browser Privacy Css Html JavaScript Tracking

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring