Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-23 14:58:00 UTC
ThreatPost
ThreatPost
ThreatList: 3 Out of 4 Employees Pose a Security Risk to Businesses

Finance-sector employees fared the worst in an awareness survey, with 85 percent showing some lack of cybersecurity and data privacy knowledge.

Malware Most Recent ThreatLists Web Security Employee Awareness Insider Threats Malware Media Pro Phishing Risky Behavior Social Engineering Threatlist
2018-10-23 14:48:00 UTC
ThreatPost
ThreatPost
Adult Website Hack Exposes 1.2M ‘Wife Lover’ Fans

A 40-year-old, easily cracked encryption method was used to protect the 98MB database of user information.

Breach Cryptography Hacks Privacy Web Security Ashley Madison Data Breach Desencrypt Email Addresses Erotica Hack Porn User Information Website Wife Lovers
2018-10-23 14:37:00 UTC
The Daily Swig
The Daily Swig
Critical vulnerabilities in FreeRTOS allowed for IoT device compromise

Flaws could have affected smart homes and critical infrastructure. 

2018-10-23 12:31:00 UTC
ThreatPost
ThreatPost
Thousands of Applications Vulnerable to RCE via jQuery File Upload

The flaw has existed for eight years thanks to a security change in Apache.

Vulnerabilities Apache CVE-2018-9206 Disable Htaccess Jquery File Upload Remote Code Execution Vulnerability
2018-10-23 08:52:00 UTC
The Daily Swig
The Daily Swig
Firmware zero-day leaves 2m storage devices open to RCE

NAS security flaws impact devices from Netgear, Seagate, Medion, and Western Digital.

2018-10-23 04:00:00 UTC
Dark Reading
Dark Reading
Online Malware and Threats: A Profile of Today's Security Posture

This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!

2018-10-22 20:30:00 UTC
Dark Reading
Dark Reading
US Tops Global Malware C2 Distribution

The United States hosts 35% of the world's command-and-control infrastructure, driving the frequency of host compromises.

2018-10-22 19:55:00 UTC
Krebs on Security
Krebs on Security
Who Is Agent Tesla?

A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity -- attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malware's apparent creator seems to have done little to hide his real-life identity.

A Little Sunshine Breadcrumbs Agent Tesla Colton Grubbs Discord Lastline LuminosityLink Mcanozaydin@gmail.com Memorial Healthcare Group Microsoft Office Mustafa Can Ozaydin NanoCore RAT
2018-10-22 18:00:00 UTC
Dark Reading
Dark Reading
Healthcare.gov FFE Breach Compromises 75K Users' Data

Attackers broke into a sign-up system used by healthcare insurance agents and brokers to help consumers apply for coverage.

2018-10-22 17:33:00 UTC
HackRead
HackRead
Vesta control panel servers infected with DDoS malware after supply chain attack

By Waqas

An open-source hosting panel software provider, Vesta Control Panel (VestaCP), has admitted that the company became a victim of a supply chain attack. In an announcement made by VestaCP on its forum, it was revealed that the hacker managed to contaminate the source code of its project with DDoS malware. The malware was capable of […]

This is a post from HackRead.com Read the original post: Vesta control panel servers infected with DDoS malware after supply chain attack

Malware Security DDOS Hacking Security Vulnerability

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring