Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-29 18:16:00 UTC
ThreatPost
ThreatPost
Girl Scouts Issues Data Breach Warning to 2,800 Members

Someone gained access to an email account for the Orange County chapter, which was rife with personal data.

Breach Hacks Privacy Data Exposure Email Account Girl Scouts Identity Theft Orange County Personal Data Travel Forms
2018-10-29 18:00:00 UTC
Dark Reading
Dark Reading
7 Ways an Old Tool Still Teaches New Lessons About Web AppSec

Are your Web applications secure? WebGoat, a tool old enough to be in high school, continues to instruct.

2018-10-29 16:25:00 UTC
ThreatPost
ThreatPost
Nation-State Phishing: A Country-Sized Catch

Sophisticated nation-state groups now integrate phishing as a core component of their statecraft.

Critical Infrastructure Government Hacks InfoSec Insider Web Security Andrea Little Limbago Election Interference Email Scame Infosec Insider Nation State Phishing Sophisticated Tactics State Sponsored
2018-10-29 16:13:00 UTC
ThreatPost
ThreatPost
X.Org Flaw Allows Privilege Escalation in Linux Systems

The issue impacts many large distros with GUI interfaces.

Vulnerabilities Centos CVE-2018-14665 Incorrect Privileges Linux Local Privilege Escalation Root User Vulnerability X Server X.org
2018-10-29 15:28:00 UTC
The Daily Swig
The Daily Swig
Defending the Defender: Microsoft sandboxes Windows AV

Ability to place Windows Defender in a restrictive environment follows feedback from the security community.

2018-10-29 14:30:00 UTC
Dark Reading
Dark Reading
AppSec is Dead, but Software Security Is Alive & Well

Application security must be re-envisioned to support software security. It's time to shake up your processes.

2018-10-29 14:30:00 UTC
Dark Reading
Dark Reading
AppSec Is Dead, but Software Security Is Alive & Well

Application security must be re-envisioned to support software security. It's time to shake up your processes.

2018-10-29 11:35:00 UTC
The Daily Swig
The Daily Swig
More than a token gesture: Visa, AmEx, Mastercard ramp up payments security

The push towards tokenization removes the need for online retailers to store customer card details.

2018-10-29 11:35:00 UTC
The Daily Swig
The Daily Swig
More than a token gesture: Visa, Amex, Mastercard ramp up payments security

The push towards tokenization removes the need for online retailers to store customer card details

2018-10-27 15:05:00 UTC
HackRead
HackRead
Now use Internet anonymously through Tor-enabled SIM card Onion3G

By Waqas

Privacy concerns are rising with the advancement of technology. Today, we need to be a lot more careful about online browsing than we needed to a few years back despite that we have come far ahead with technology. Tor browser and VPNs are generally believed to protect our privacy online, but what if they are also […]

This is a post from HackRead.com Read the original post: Now use Internet anonymously through Tor-enabled SIM card Onion3G

Privacy Security Anonymity Internet Security Tor VPN

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring