Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-02-06 21:05:00 UTC
Dark Reading
Dark Reading
Some Airline Flight Online Check-in Links Expose Passenger Data

Several airlines send unencrypted links to passengers for flight check-in that could be intercepted by attackers to view passenger and other data, researchers found.

2019-02-06 20:40:00 UTC
Dark Reading
Dark Reading
Consumers Care About Security - Sometimes

New RSA Security survey shows a generation gap in concerns over cybersecurity and privacy.

2019-02-06 19:30:00 UTC
Dark Reading
Dark Reading
4 Practical Questions to Ask Before Investing in AI

A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.

2019-02-06 17:51:00 UTC
ThreatPost
ThreatPost
Clever Phishing Attack Enlists Google Translate to Spoof Login Page

A tricky two-stage phishing scam is targeting Facebook and Google credentials using a landing page that hides behind Google's translate feature.

Web Security Credential Stuffing Credential Theft Facebook Google Google Translate Phishing Phishing Scam
2019-02-06 16:48:00 UTC
The Daily Swig
The Daily Swig
Washington state proposes privacy legislation as data debate heats up

Bill takes a leaf out of GDPR’s book

2019-02-06 16:25:00 UTC
ThreatPost
ThreatPost
What are Data Manipulation Attacks, and How to Mitigate Against Them

Hackers don't always steal data. Sometimes the goal is to manipulate the data to intentionally trigger external events that can be capitalized on.

Cloud Security Hacks InfoSec Insider Business Data Integrity Data Integrity Data Manipulation Data Manipulation Attack Endpoint Protection Endpoint Visibility MITRE ATT&CK Framework Supply Chain Attack Tesla
2019-02-06 15:40:00 UTC
The Daily Swig
The Daily Swig
New Chrome extension detects breached passwords

Google’s Password Checkup add-on raises privacy hackles

2019-02-06 15:38:00 UTC
HackRead
HackRead
Flaws in RDP protocols leaving machines prone to remote code execution

By Waqas

Major Security Flaws Identified in RDP Protocols making Machines Prone to Remote Code Execution and Reverse RDP Attacks. Check Point researchers have identified that three remote desktop protocol (RDP) tools, which are probably the most popular ones for Windows, macOS, and Linux systems, are plagued with not one or two but twenty-five CVE-listed security flaws. […]

This is a post from HackRead.com Read the original post: Flaws in RDP protocols leaving machines prone to remote code execution

Microsoft Security Linux Mac RDP Security Technology Vulnerability
2019-02-06 15:30:00 UTC
Dark Reading
Dark Reading
Serverless Computing: 'Function' vs. 'Infrastructure' as-a-Service

How much do companies really gain from offloading security duties to the cloud? Let's do the math.

2019-02-06 15:24:00 UTC
ThreatPost
ThreatPost
Microsoft Confirms Serious ‘PrivExchange’ Vulnerability

The elevated privilege flaw exists in Microsoft Exchange and would allow a remote attacker to impersonate an administrator.

Vulnerabilities Web Security Microsoft Microsoft Exchange Privexchange Vulnerability Workaround

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES