Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-04-04 17:31:00 UTC
ThreatPost
ThreatPost
Facebook Exposed Dataset Debacle: Who’s Really To Blame?

After two databases were discovered leaking Facebook data, Facebook and Amazon are both pointing fingers - but researchers say the onus lies on all parties involved as data collection continues to grow.

Facebook Privacy Amazon AWS S3 Bucket Cultura Colectiva Facebook Data Leak
2019-04-04 16:22:00 UTC
HackRead
HackRead
Hard Times for Cryptojacking

By David Balaban

What is Cryptojacking? It is an attack in which hackers secretly utilize the computing power of your device to mine cryptocurrency – The cybercrime climate is flexible enough to quickly adapt to new circumstances and trends. The fact that cryptocurrency markets skyrocketed in the past several years has encouraged malicious actors to find ways of getting on […]

This is a post from HackRead.com Read the original post: Hard Times for Cryptojacking

Hacking News Malware Security CoinHive Cryptocurrency Cryptojacking Hacking Scam Security
2019-04-04 16:01:00 UTC
The Daily Swig
The Daily Swig
Hacker stereotypes must be broken to bridge the skills gap

Infosec isn’t all people “watching green letters drop down a black screen”

2019-04-04 15:00:00 UTC
The Daily Swig
The Daily Swig
How should you structure your cybersecurity team?

Experts at IP Expo Manchester discuss their security priorities

2019-04-04 14:30:00 UTC
Dark Reading
Dark Reading
True Cybersecurity Means a Proactive Response

Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security.

2019-04-04 13:26:00 UTC
ThreatPost
ThreatPost
Free Cynet Threat Assessment for Mid-sized and Large Organizations

Have your business try Cynet's Free Threat Assessment that checks for malware, C&C connections, data exfiltration, phishing link access, user credential thefts attempts, etc.

Vulnerabilities C&C Connections Data Exfiltration Free Threat Assessment Malware Threat Assessment Unpatched Vulnerabilities User Credential Theft
2019-04-04 13:22:00 UTC
The Daily Swig
The Daily Swig
Ransomware attack on Black Hat Asia halted by NOC

Network operations team stops data-stealing malware in its tracks

2019-04-04 13:01:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Why ‘PWNED!’ is appearing on some GPS smartwatches

Over 20 models of smartwatches, some bought for kids, allow for creeps to eavesdrop and track users, in spite of a ban.

IoT Privacy Security Threats Christopher Bleckmann-Dreher GPS Maps Smart Watches
2019-04-04 13:00:00 UTC
ThreatPost
ThreatPost
BEC Scam Gang London Blue Evolves Tactics, Targets

Business email compromise group London Blue is back with evolved email domain spoofing tactics and a newfound interest in targets in Asia.

Hacks Mobile Security BEC Business Email Compromise Domain Spoofing London Blue Scam Spam Email
2019-04-04 12:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Facebook apps expose millions of users’ Facebook data

Once more unto the breach, dear Facebook Friends of Friends...

Data Loss Facebook Privacy Data Leak

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring