Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-05-03 10:02:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Criminals are hiding in Telegram – but backdoors are not the answer

When it comes to an easy life, the criminals behind the fearful Anubis banking malware have become big fans of Twitter and, increasingly, the secure messaging of Telegram.

Malware Security Threats Anubis End-to-end Encryption Telegram Twitter WhatsApp
2019-05-03 09:51:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Cryptocoin theft, scam and fraud could total more than $1.2b in Q1

Crooks have developed "ingenious" new ways to drain user accounts and wallets, CipherTrace says, prodding regulators into action.

Cryptocurrency Law & Order Security Threats Bitfinex Cryptocurrency Exit Scams Money Laundering
2019-05-03 09:50:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Cybersecurity experts battle for right to repair

A battle rages between manufacturers and users over who can repair a product, with tech companies using security concerns as a weapon.

Adobe Organisations Security Threats Built In Obsolescence Cybersecurity Device Makers Right To Repair
2019-05-03 09:22:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google rolling out auto-delete for your location and activity history

Auto-delete will hopefully please those of us who haven't already turned off location history altogether (for very good reason).

Google Privacy Auto-delete Location Data Location History Location Tracking Web & App Activity
2019-05-02 22:30:00 UTC
Dark Reading
Dark Reading
New Exploits For Old Configuration Issues Heighten Risk for SAP Customers

Exploits give attackers a way to create havoc in business-critical SAP ERP, CRM, SCM, and other environments, Onapsis says.

2019-05-02 21:15:00 UTC
ThreatPost
ThreatPost
Critical Flaws Found in Eight Wireless Presentation Systems

Crestron, Barco wePresent, Extron ShareLink and more wireless presentation systems have an array of critical flaws.

IoT Vulnerabilities Barco WePresent Crestron Critical Vulnerability Extron ShareLink Wireless Presentation System
2019-05-02 20:00:00 UTC
Dark Reading
Dark Reading
Misconfigured Ladders Database Exposed 13M User Records

Job-hunting site Ladders leaves job seeker data exposed on the Internet.

2019-05-02 19:30:00 UTC
Dark Reading
Dark Reading
Security Doesn't Trust IT - and IT Doesn't Trust Security

How a rocky relationship between IT operations and cybersecurity teams can compound security risks.

2019-05-02 19:10:00 UTC
ThreatPost
ThreatPost
D-Link Cloud Camera Flaw Gives Hackers Access to Video Stream

Researchers warn customers to reconsider the use of the camera’s remote access feature if the device is monitoring highly sensitive areas of their household or company.

Cryptography Hacks IoT Privacy Vulnerabilities Web Security D-Link Cloud Camera DCS-2132L MitM MyDlink Services

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring