Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-11-13 18:37:00 UTC
HackRead
HackRead
Elite North Koreans aren’t opposed to exploiting internet for financial gain

By David Balaban

According to a report from Recorded Future, it seems the ruling elite in North Korea are now using the Internet more and more to take advantage of money-making opportunities and avoid various economic sanctions. Not only is the Kim regime utilizing interbank transfer systems, online gaming, and even cryptocurrencies, they’re exploiting them for money. The […]

This is a post from HackRead.com Read the original post: Elite North Koreans aren’t opposed to exploiting internet for financial gain

Phishing Scam Security Cyber Crime Cyberwar DPRK Hacking Lazarus North Korea Security
2018-11-13 18:21:00 UTC
Ars Technica
Ars Technica
Windows 10 October 2018 Update is back, this time without deleting your data

Microsoft is opening up about some of its testing procedures, too.

Tech Bugs Data Loss Microsoft October 2018 Update Rs5 Security Windows Windows 10
2018-11-13 17:44:00 UTC
ThreatPost
ThreatPost
Google’s G Suite, Search and Analytics Taken Down in Hijacking

Google cloud business customers were impacted by a Border Gateway Protocol hijacking.

Cloud Security Critical Infrastructure Hacks Web Security BGP Hijack Border Gateway Protocol China Telecom Cryptocurrency G Suite Google Analytics Google Cloud Platform Google Cloud Services Google Search
2018-11-13 17:15:00 UTC
Dark Reading
Dark Reading
Google Traffic Temporarily Rerouted via Russia, China

The incident, which Google reports is now resolved, could be the result of either technical mistakes or malicious activity.

2018-11-13 17:03:00 UTC
ThreatPost
ThreatPost
Unpatched Android OS Flaw Allows Adversaries to Track User Location

The vulnerability is one of many with the same root cause: Cross-process information leakage.

Mobile Security Privacy Vulnerabilities Android OS Cross Process Information Leakage CVE-2018-9581 Google Intents Location Tracking Nightwatch Vulnerability Wifi Information
2018-11-13 16:44:00 UTC
ThreatPost
ThreatPost
Adobe Fixes Acrobat and Reader Flaw With Publicly-Available PoC

Overall, the company released only three patches as part of its regularly-scheduled November update.

Vulnerabilities Web Security Acrobat And Reader Adobe Adobe Flash Adobe Patch Adobe Update Information Disclosure Patch Tuesday Vulnerability
2018-11-13 16:26:00 UTC
Krebs on Security
Krebs on Security
That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards

If you own a domain name that gets decent traffic and you fail to pay its annual renewal fee, chances are this mistake will be costly for you and for others. Lately, neglected domains have been getting scooped up by crooks who use them to set up fake e-commerce sites that steal credit card details from unwary shoppers.

A Little Sunshine Latest Warnings The Coming Storm Web Fraud 2.0 Abuse.ch Flashpoint Instagram Julie Randall Magecart RiskIQ Shadowserver
2018-11-13 16:26:00 UTC
HackRead
HackRead
Facebook Messenger to offer Unsend feature to delete sent messages

By Waqas

Facebook has made many efforts so far to refine its Messenger app. This year in May, Facebook CEO Mark Zuckerberg along with other executives of the social network admitted that the Facebook Messenger has to be refined since the current app contained many useless features while lacked critically important ones. Such as, its UI could […]

This is a post from HackRead.com Read the original post: Facebook Messenger to offer Unsend feature to delete sent messages

Privacy Social Network News Technology News Facebook Facebook Messenger Social Media WhatsApp
2018-11-13 15:30:00 UTC
Dark Reading
Dark Reading
RIP, 'IT Security'

Information security is vital, of course. But the concept of "IT security" has never made sense.

2018-11-13 14:39:00 UTC
ThreatPost
ThreatPost
Podcast: IoT Firms Face a ‘Tidal Wave’ of Lawsuits, Attorney Explains

An attorney in the infamous 2015 Jeep hack predicts that more lawsuits related to IoT security are looming in the future.

IoT Podcasts 3G Iot Legal Issue IoT Security Jeep Hack

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring