Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-04-16 18:01:00 UTC
ThreatPost
ThreatPost
Wipro Confirms Hack and Supply Chain Attacks on Customers

The IT giant's networks were infiltrated and used to mount supply-chain attacks on its enterprise customers.

Breach Hacks Attacks On Customers Confirm Email System Compromise Fortune 500 Hack Supply Chain Attack Wipro
2019-04-16 17:20:00 UTC
HackRead
HackRead
Crooks are selling “Digital Doppelgangers” to bypass anti-fraud protection

By Waqas

Financial Crimes to Reach an Unprecedented High by 2023 if Dark Web marketplaces like Genesis are allowed to Operate- Researchers Claim. According to the latest research from Juniper Research, cybercriminals have developed a wide range of advanced tools to help users evade machine learning-based anti-fraud systems. On the other hand, Kaspersky Lab researchers have identified […]

This is a post from HackRead.com Read the original post: Crooks are selling “Digital Doppelgangers” to bypass anti-fraud protection

Cyber Crime Fraud Hackers Hacking Privacy Scam Security
2019-04-16 16:13:00 UTC
ThreatPost
ThreatPost
Windows Zero-Day Emerges in Active Exploits

Patched just last week, the Windows kernel bug is being used for full system takeover.

Vulnerabilities Active Exploits CVE-2019-0859 Local Privilege Escalation Microsoft Patch Use-after-free Vulnerability Windows Kernel Zero Day
2019-04-16 16:00:00 UTC
Dark Reading
Dark Reading
IT Outsourcing Firm Wipro Investigates Data Breach

Employee accounts may have been compromised in a sophisticated phishing campaign.

2019-04-16 15:07:00 UTC
The Daily Swig
The Daily Swig
Adblock Plus filter feature runs risk of malicious code exploit

Attackers could put arbitrary code into web pages, researcher warns

2019-04-16 14:34:00 UTC
ThreatPost
ThreatPost
Malspam Campaigns Distribute HawkEye Keylogger Post Ownership Change

After the HawkEye malware kit underwent an ownership change and new development, researchers are spotting the keylogger used in several malicious email campaigns.

Malware Hawkeye Hawkeye Reborn V9 Information Stealer Keylogger Licensing Model Malicious Email Malspam Campaign Malware Malware Kit
2019-04-16 14:34:00 UTC
ThreatPost
ThreatPost
Malspam Campaigns Distribute HawkEye Keylogger, Post Ownership Change

After the HawkEye malware kit underwent an ownership change and new development, researchers are spotting the keylogger used in several malicious email campaigns.

Malware Hawkeye Hawkeye Reborn V9 Information Stealer Keylogger Licensing Model Malicious Email Malspam Campaign Malware Malware Kit
2019-04-16 14:30:00 UTC
Dark Reading
Dark Reading
New Attacks (and Old Attacks Made New)

Although new attacks might get the most attention, don't assume old one have gone away.

2019-04-16 12:45:00 UTC
The Daily Swig
The Daily Swig
Global governments demonstrate rising commitment to cybersecurity 

But more effort is needed, says UN body

2019-04-16 11:04:00 UTC
The Daily Swig
The Daily Swig
Fortinet pays $545k to US gov’t after selling ‘Chinese-made’ tech as home grown

Security vendor agrees settlement over claims

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring