Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-11-02 15:30:00 UTC
The Daily Swig
The Daily Swig
Software dependencies: Who will take responsibility for securing the foundations?

BountyGraph is crowdfunding bug bounties for high-impact flaws lower down in the stack.

2018-11-02 15:16:00 UTC
ThreatPost
ThreatPost
ThreatList: Fewer Big DDoS Attacks in Q3, Overall Rate Holds Steady

Meanwhile, Saturday now is the most “dangerous” day of the week for DDoS attacks.

IoT Malware Most Recent ThreatLists Vulnerabilities Web Security 2018 Attack Rates Attack Volume Blizzard DDoS Gafgyt Kaspersky Lab Large Attacks Mirai Q3 Third Quarter
2018-11-02 15:03:00 UTC
Krebs on Security
Krebs on Security
SMS Phishing + Cardless ATM = Profit

Thieves are combining SMS-based phishing attacks with new "cardless" ATMs to rapidly convert phished bank account credentials into cash. Recent arrests in Ohio shed light on how this scam works.

A Little Sunshine All About Skimmers Cardless ATM Ciprian-Raducu Antoche-Grecu Fifth Third Bank
2018-11-02 15:00:00 UTC
Dark Reading
Dark Reading
Tackling Cybersecurity from the Inside Out

New online threats require new solutions.

2018-11-02 14:50:00 UTC
The Daily Swig
The Daily Swig
‘Long time listener, first time caller’

Top infosec trends in the social media spotlight this week.

2018-11-02 12:30:00 UTC
The Daily Swig
The Daily Swig
Google begins enforcing JavaScript for logins

‘If you’re not wearing a tie, you’re not getting in’

2018-11-02 12:00:00 UTC
Dark Reading
Dark Reading
Speed Up AppSec Improvement With an Adversary-Driven Approach

Stop overwhelming developers and start using real-world attack behavior to prioritize application vulnerability fixes.

2018-11-01 21:50:00 UTC
ThreatPost
ThreatPost
Yi IoT Home Camera Riddled with Code-Execution Vulnerabilities

Five of them allow remote compromise of the IoT gadgets, so attackers can intercept video feeds and more.

Cloud Security IoT Vulnerabilities Cisco Denial Of Service Internet Of Things Remote Code Execution Talos Video Feed Interception Vulnerabilities Yi Camera
2018-11-01 21:31:00 UTC
ThreatPost
ThreatPost
GDPR’s First 150 Days Impact on the U.S.

Weighing the impact of GDPR and how the historic legislation has shaped privacy protection measures in the U.S., so far.

Government Privacy Apple CEO Tim Cook GDPR General Data Protection Regulation Health Insurance Portability And Accountability Act HIPAA International Conference Of Data Protection And Privacy Commissioners Conference
2018-11-01 21:10:00 UTC
Dark Reading
Dark Reading
New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points

'BleedingBit' could give attackers control of the wireless network from a remote vantage point.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring