Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2025-01-11 13:47:00 UTC
HackRead
HackRead
Fake PoC Exploit Targets Cybersecurity Researchers with Malware

A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft's Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.

Security Malware Scams And Fraud Cyber Attack Cybersecurity PoC Vulnerability Windows
2025-01-11 10:51:00 UTC
HackRead
HackRead
Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams

Infoblox cybersecurity researchers investigating the mysterious activities of 'Muddling Meerkat' unexpectedly uncovered widespread use of domain spoofing in malicious spam campaigns.

Security Cyber Attack Cybersecurity Domain Spoofing Malspam Malware Spam
2025-01-10 22:37:00 UTC
Dark Reading
Dark Reading
China's UNC5337 Exploits a Critical Ivanti RCE Bug, Again

New year, same story. Despite Ivanti's commitment to secure-by-design principles, Chinese threat actors are exploiting its edge devices for the nth time.

2025-01-10 22:37:00 UTC
Dark Reading
Dark Reading
Threat Actors Exploit a Critical Ivanti RCE Bug, Again

New year, same story. Despite Ivanti's commitment to secure-by-design principles, threat actors — possibly the same ones as before — are exploiting its edge devices for the nth time.

2025-01-10 21:21:00 UTC
HackRead
HackRead
Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways

Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products.

Security Connect Secure Cybersecurity Ivanti Policy Secure Vulnerability ZTA Gateways
2025-01-10 20:53:00 UTC
Dark Reading
Dark Reading
Fake CrowdStrike 'Job Interviews' Become Latest Hacker Tactic

Cybercriminals are luring victims into downloading the XMRig cryptomining malware via convincing emails, inviting them to schedule fake interviews using a malicious link.

2025-01-10 20:22:00 UTC
Dark Reading
Dark Reading
Russia Carves Out Commercial Surveillance Success Globally

Growing sales of the System for Operative Investigative Activities (SORM), a Russian wiretapping platform, in Central Asia and Latin American suggests increasing risks for Western businesses.

2025-01-10 15:00:00 UTC
Dark Reading
Dark Reading
The Path Toward Championing Diversity in Cybersecurity Education

To build a truly inclusive and diverse cybersecurity workforce, we need a comprehensive approach beyond recruitment and retention.

2025-01-10 11:21:00 UTC
HackRead
HackRead
Banshee Stealer Hits macOS Users via Fake GitHub Repositories

SUMMARY Cybersecurity researchers at Check Point detected a new version of Banshee Stealer in late September 2024, distributed…

Security Apple Malware Banshee Cybersecurity GitHub Lumma Stealer Macbook MacOS
2025-01-10 09:41:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Deuxième rapport Sophos Active Adversary 2024 (1S24)

Un changement radical dans les données disponibles permettent de développer de nouvelles perspectives à partir du premier semestre 2024.

Security Operations Threat Research Featured

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES