Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-12-17 22:50:00 UTC
ThreatPost
ThreatPost
U.S. Ballistic Missile Defense System Rife with Security Holes

Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.

Critical Infrastructure Government Vulnerabilities Ballistic Missile System Cybersecurity Problems Department Of Defense Security Audit The Report Vulnerabilities
2018-12-17 21:17:00 UTC
ThreatPost
ThreatPost
Twitter Draws Data Privacy Concerns with Two New Bugs

The two flaws shed light on heightened concern around user data privacy when it comes to data.

Vulnerabilities Web Security 0auth Bug Data Privacy IP Address Social Media Twitter Twitter Security
2018-12-17 18:27:00 UTC
HackRead
HackRead
Chinese hackers reportedly stole secret US Navy data

By Waqas

Hackers of Chinese origin have stolen data from US Navy contractors whose content includes highly confidential information on advanced military technologies. In June this year, it was reported that Chinese hackers stole 614 gigabytes of US Navy’s anti-ship missile data. Now, authorities in the United States have once again accused Chinese hackers of stealing secret data belonging […]

This is a post from HackRead.com Read the original post: Chinese hackers reportedly stole secret US Navy data

Hacking News China Cyber Attack Cyber War Hacking Navy Security USA
2018-12-17 17:29:00 UTC
ThreatPost
ThreatPost
Automotive Security: It’s More Than Just What’s Under The Hood

True auto safety can only be achieved by knowing what every piece of code and hardware is that goes into the car.

Breach Privacy Vulnerabilities ACRemoteRequest API Calls AutoCode Program Automotive Grade Linux Automotive Security Deserialization Key Fobs Linux Operating System Nissan Leaf OWASP RCE Remote Code Execution Vehicle Attack Surface VIN Number
2018-12-17 16:42:00 UTC
ThreatPost
ThreatPost
Charming Kitten Iranian Espionage Campaign Thwarts 2FA

The campaign targets politicians involved in economic and military sanctions against Iran, along with various journalists and human rights activists.

Government Web Security Apt Charming Kitten Espionage Irán Phishing Political Targets Sanctions Two Factor Authentication
2018-12-17 15:30:00 UTC
The Daily Swig
The Daily Swig
SQLite vulnerability could lead to remote code execution

Critical bug found in popular database management system

2018-12-17 15:30:00 UTC
Dark Reading
Dark Reading
Shhhhh! The Secret to Secrets Management

Companies need to take a centralized approach to protecting confidential data and assets. Here are 12 ways to get a handle on the problem.

2018-12-17 14:28:00 UTC
ThreatPost
ThreatPost
PewDiePie Hackers Launch Second Printer Siege, According to Reports

The hackers behind the attack said they have targeted 100,000 more printers in the latest attack dubbed #PrinterHack2.

IoT Uncategorized Vulnerabilities Web Security Hack Hacker Pewdiepie Printer Printer Vulnerability Vulnerability
2018-12-17 14:28:00 UTC
ThreatPost
ThreatPost
PewDiePie Hackers Say They Launched Second Printer Siege

The hackers behind the attack said they have targeted hundreds of thousands of printers in the latest attack dubbed #PrinterHack2.

IoT Uncategorized Vulnerabilities Web Security Hack Hacker Pewdiepie Printer Printer Vulnerability Vulnerability
2018-12-17 14:08:00 UTC
The Daily Swig
The Daily Swig
State-backed hackers switch to inferior tactics to avoid being fingered for attacks

Hacking groups are keen to “blend in with the noise”, says former NSA official

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring