Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-05-08 19:22:00 UTC
HackRead
HackRead
The Different Ways a Data Breach Can Impact Businesses

By Ryan De Souza

According to a recent report from the Office for National Statistics (ONS), cybercrime has risen by an incredible 63% and is primarily caused by malware and computer misuse. However, despite the real threat hackers pose to companies of all sizes, many businesses are failing to take the issue seriously. To ensure your organization never falls […]

This is a post from HackRead.com Read the original post: The Different Ways a Data Breach Can Impact Businesses

Technology News Breach Business Hacking Security Technology
2019-05-08 18:00:00 UTC
Dark Reading
Dark Reading
FBI: Cybercrime Losses Doubled in 2018

The world has embraced digital technology, but cybercrime is putting a serious dent in corporate finances, the FBI finds.

2019-05-08 17:35:00 UTC
ThreatPost
ThreatPost
Google Patches Critical Remote Code-Execution Flaws in Android

The Android security update patches 15 bugs, four rated critical, 10 rated high and one ranked moderate in severity.

Mobile Security Vulnerabilities Android Q Broadcom May Android Security Bulletin Nvidia Qualcomm Remote Code Execution
2019-05-08 17:14:00 UTC
ThreatPost
ThreatPost
Lax Telco Security Allows Mobile Phone Hijacking and Redirects

A Q&A with Kaspersky Lab researcher David Jacoby examines a gaping hole in the telco customer-service process that allows adversaries to commandeer phone calls.

Featured Hacks Mobile Security Privacy Security Analyst Summit Videos Vulnerabilities Customer Service David Jacoby Hijacking Phone Calls Q&A Redirect SAS 2019 Social Engineering Sweden Telcos Telephone Providers Video Interview
2019-05-08 16:37:00 UTC
HackRead
HackRead
Binance exchange hacked: Bitcoin worth $40.7M stolen

By Uzair Amir

API keys and 2FA codes along with other sensitive data has also been stolen. Binance, one of the largest cryptocurrency exchanges in the world by volume, has become a victim of a massive data breach in which hackers stole roughly 7,000 bitcoin (worth over $40 million). See: Bitcoin Price Drops 10% Amid Binance Exchange Hacking […]

This is a post from HackRead.com Read the original post: Binance exchange hacked: Bitcoin worth $40.7M stolen

Hacking News Binance Bitcoin Cryptocurrency Cyber Crime Hacking Phishing Security
2019-05-08 16:03:00 UTC
ThreatPost
ThreatPost
Google Touts Android Q’s New Security Update Process and Better Privacy Controls for Apps

At Google I/O, the tech giant announced it is beefing up security in phones with its latest Android Q operating system by offering direct updates and privacy controls.

Mobile Security Android Android Operating System Android Q Android Security Updates Google Google I/O Privacy
2019-05-08 16:01:00 UTC
ThreatPost
ThreatPost
Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise

Cloud misconfigurations, business email compromise (BEC) and intellectual property theft are all up in the Verizon DBIR 2019 from last year.

Breach Cloud Security Government Hacks Malware Privacy Web Security 2019 Attacker Motivations BEC Business Email Compromise Cloud Misconfiguration Cloud Storage Data Breach Incident Report Dbir Espionage Healthcare Ransomware Verizon
2019-05-08 12:30:00 UTC
ThreatPost
ThreatPost
Top 5 Configuration Mistakes That Create Field Days for Hackers

Having appropriate security configurations requires your applications, servers and databases to be hardened in accordance with best practices.

Breach Featured Hacks InfoSec Insider IoT Malware Vulnerabilities Common Misconfiguration Mistakes Default Passwords Hackers Infosec Insider Network Configuration Password Reuse Patching Remote Desktop Protocol Top 5
2019-05-08 12:01:00 UTC
ThreatPost
ThreatPost
Cynet Provides Security Responders with Free IR Tool to Validate and Respond to Active Threats

Cynet Free IR empowers its users with a solution that is accessible and easy to use, bringing crucial incident response services in-house, while saving them valuable time and resources.

Malware Vulnerabilities Web Security Breached Users Cynet Incident Response IOC IR Malicious Files
2019-05-08 11:32:00 UTC
The Daily Swig
The Daily Swig
Hackers steal $40m in Bitcoin from crypto-exchange Binance

More than 7,000 BTC stolen in one transaction

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring