Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-04-17 22:50:00 UTC
Dark Reading
Dark Reading
Nation-State Hacker Group Hijacking DNS to Redirect Email, Web Traffic

'Sea Turtle' group has compromised at least 40 national security organizations in 13 countries so far, Cisco Talos says.

2019-04-17 21:25:00 UTC
Dark Reading
Dark Reading
Tips for the Aftermath of a Cyberattack

Incident response demands technical expertise, but you can't fully recover without non-IT experts.

2019-04-17 20:59:00 UTC
ThreatPost
ThreatPost
Ubiquitous Bug Allows HIPAA-Protected Malware to Hide Behind Medical Images

The ubiquitous nature of the flaw opens the door for rapidly spreading, crippling cyberattacks.

Hacks Malware Vulnerabilities Dicom Standard HIPAA Hybrid Files Malware Medical Images Mitigation Rapidly Spreading Regulatory Issues Vulnerability
2019-04-17 19:53:00 UTC
ThreatPost
ThreatPost
Researchers: Facebook’s Data-Leveraging Scandal Puts Users on Notice

After a report revealed that Facebook used user data to leverage its relationships with other companies, researchers are stressing that both firms and users need to re-assess data privacy.

Facebook Privacy Data Collection Data Privacy Data Sharing Facebook Data Nbc Report Social Media User Data As Leverage
2019-04-17 19:41:00 UTC
Dark Reading
Dark Reading
New Malware Campaign Targets Financials, Retailers

The attack uses a legitimate remote access system as well as several families of malware.

2019-04-17 18:30:00 UTC
Dark Reading
Dark Reading
Legacy Apps: The Security Risk Lurking in Dusty Corners

Four best practices to keep old code from compromising your enterprise environment.

2019-04-17 18:20:00 UTC
Dark Reading
Dark Reading
Ever-Sophisticated Bad Bots Target Healthcare, Ticketing

From criminals to competitors, online bots continue to scrape information from sites and pose as legitimate users.

2019-04-17 18:15:00 UTC
Dark Reading
Dark Reading
Inside the Dark Web's How-To Guides for Teaching Fraud

A new study investigates nearly 30,000 guides to explore what fraudsters sell and teach aspiring cybercriminals.

2019-04-17 17:56:00 UTC
Krebs on Security
Krebs on Security
How Not to Acknowledge a Data Breach

I'm not a huge fan of stories about stories, or those that explore the ins and outs of reporting a breach. But occasionally it seems necessary to publish such accounts when companies respond to a breach report in such a way that it's crystal clear that they wouldn't know what to do with a breach if it bit them in the nose, let alone festered unmolested in some dark corner of their operations.

A Little Sunshine Data Breaches Bhanu Ballapuram Wipro Data Breach
2019-04-17 17:32:00 UTC
ThreatPost
ThreatPost
State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally

An ongoing campaign, active since 2017, has been stealing credentials via global DNS hijacking attacks.

Government Hacks Credential Cyberattack Department Of Homeland Security DNS Hijack DNS Hijacking Domain Name System Hack Irán

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring