Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSMore than one-third of surveyed organizations (36 percent) said they have experienced a security incident because of a remote worker's actions.
ShadowHammer campaign latest to highlight dangers of supply chain attacks.
Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look.
Two serious flaws in the telemetry protocol could allow a hacker to control vulnerable Implantable Cardioverter Defibrillators (ICDs).
Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.
The attack appears to be associated with a China-backed APT actor.
Police in the UK lack the tools to prosecute cybercriminals
The contractor with whom it shared the data has a vulnerable, unpatched network.
Browser bugs aplenty during three-day hackathon in Vancouver
US agency shared “unnecessary” information with contractor
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.