Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-04-11 17:19:00 UTC
ThreatPost
ThreatPost
Users Urged to Uninstall WordPress Yuzo Plugin After Flaw Exploited

A vulnerability in the Yuzo Related Posts WordPress plugin, used by 60,000 websites, is being exploited in the wild.

Vulnerabilities Web Security Cross Site Scripting Attack Exploit Vulnerability Wordpress Wordpress Plugin Yuzo Related Posts Zeroday
2019-04-11 16:14:00 UTC
Krebs on Security
Krebs on Security
Android 7.0+ Phones Can Now Double as Google Security Keys

Google this week made it easier for Android users to enable strong 2-factor authentication (2FA) when logging into Google's various services. The company announced that all phones running Android 7.0 and higher can now be used as Security Keys, an additional authentication layer that helps thwart phishing sites and password theft.

Security Tools Advanced Protection Android 7.0 Christiaan Brand Google Security Keys U2F Universal 2nd Factor Yubico
2019-04-11 16:05:00 UTC
ThreatPost
ThreatPost
SAS 2019: Fake News Peddlers Adopt Clever New Trick to Fool Facebook, Twitter

At SAS 2019, Recorded Future CTO discusses a new kind of high-profile influence campaign spotted using a new technique: Old news.

Podcasts Privacy Security Analyst Summit Data Facebook Fake News Influence Campaign SAS 2019 Social Media Twitter
2019-04-11 15:31:00 UTC
The Daily Swig
The Daily Swig
Gmail tools up to thwart MitM attacks

Masters of MTA-STS

2019-04-11 14:50:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Serious Security: How web forms can steal your bandwidth and harm your brand

Got a mailing list? Ever signed up for one? Ever stopped to think how a crook could abuse the security-related confirmation process?

Spam Reflection Spam Spews Web Forms
2019-04-11 14:30:00 UTC
Dark Reading
Dark Reading
When Your Sandbox Fails

The sandbox is an important piece of the security stack, but an organization's entire strategy shouldn't rely on its ability to detect every threat. Here's why.

2019-04-11 14:11:00 UTC
The Daily Swig
The Daily Swig
Apache Axis servers vulnerable to RCE due to expired domain

Open source project fixes bug after researchers point out technical mishap

2019-04-11 12:54:00 UTC
ThreatPost
ThreatPost
Amazon Auditors Listen to Echo Recordings, Report Says

Amazon is under fire for its privacy policies after a Bloomberg report revealed that the company hires auditors to listen to Echo recordings.

IoT Privacy Amazon Amazon Alexa Amazon Recording Data Echo Voice Services
2019-04-11 12:14:00 UTC
HackRead
HackRead
Wikileaks founder Julian Assange arrested in London

By Uzair Amir

Wikileaks founder Julian Assange, 47, has been arrested by Met Police from the embassy of Ecuador in London after seven years of refuge over a now dropped case of sexual assault. The arrest took place after Ecuadorian president Lenin Moreno withdrew Assange’s asylum for “repeatedly violating international conventions.” Previously, Assange had refused to leave the embassy fearing extradition […]

This is a post from HackRead.com Read the original post: Wikileaks founder Julian Assange arrested in London

Cyber Crime Ecuador Julian Assange LEAKS NSA Snowden WhistleBlower Wikileaks
2019-04-11 11:59:00 UTC
The Daily Swig
The Daily Swig
Atlassian’s Confluence collaboration server blighted by critical RCE bug

Pesky widgets pose a critical risk

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring