Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2024-02-21 22:03:00 UTC
Naked Security | Sophos
Naked Security | Sophos
ConnectWise sounds the alarm on two vulnerabilities

Are you using ScreenConnect? Here’s what to know – and whether to worry

Products & Services Security Operations Connectwise CVE-2024-1708 CVE-2024-1709 Featured ScreenConnect
2024-02-21 20:25:00 UTC
HackRead
HackRead
Types of SaaS Applications: Categories and Examples

By Uzair Amir

Learn about different types of SaaS solutions and the most widely used SaaS categories to create your own…

This is a post from HackRead.com Read the original post: Types of SaaS Applications: Categories and Examples

Technology Cloud Cloud Computing SaaS
2024-02-21 20:01:00 UTC
Naked Security | Sophos
Naked Security | Sophos
LockBit: Lessons learned on winning the war on cybercrime

Making sense of the ransomware-group takedown -- what it means for ransomware and law enforcement

Threat Research Featured Law Enforcement Lockbit Ransomware Takedown
2024-02-21 19:00:00 UTC
HackRead
HackRead
Top Software Development Outsourcing Trends

By Uzair Amir

Eastern Europe is swiftly rising to prominence in the software development outsourcing sector. This ascendance is marked not…

This is a post from HackRead.com Read the original post: Top Software Development Outsourcing Trends

Technology Eastern Europe Europe Software
2024-02-21 18:00:00 UTC
HackRead
HackRead
New Linux Malware “Migo” Exploits Redis for Cryptojacking, Disables Security

By Deeba Ahmed

Migo Malware Campaign: User-Mode Rootkit Hides Cryptojacking on Linux Systems.

This is a post from HackRead.com Read the original post: New Linux Malware “Migo” Exploits Redis for Cryptojacking, Disables Security

Security Malware Cryptojacking Cybersecurity Linux Migo Redis Security
2024-02-21 15:10:00 UTC
HackRead
HackRead
Crypto Exchange FixedFloat Hacked: $26 Million in BTC, ETH Stolen

By Deeba Ahmed

FixedFloat suffered a significant loss of over 1,700 Ethereum and over 400 Bitcoin due to a drainer attack on February 18, 2024.

This is a post from HackRead.com Read the original post: Crypto Exchange FixedFloat Hacked: $26 Million in BTC, ETH Stolen

Security Cryptocurrency Cyber Attacks News Bitcoin Crypto Cyber Attack Cybersecurity Ethereum FixedFloat
2024-02-21 14:17:00 UTC
HackRead
HackRead
Why Front-End Development Matters for Online Businesses?

By Owais Sultan

Front-end development, sometimes called client-side development, creates CSS, HTML, and JavaScript for online apps and sites so users…

This is a post from HackRead.com Read the original post: Why Front-End Development Matters for Online Businesses?

Technology Business Coding Development Front-End
2024-02-21 12:27:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Sophos NDR is now available on AWS

Get started quickly with Sophos NDR.

Products & Services AWS NDR Network
2024-02-21 10:55:00 UTC
HackRead
HackRead
Unsecured Database Leaks 153 GB of Filipino Student and Family Data

By Deeba Ahmed

Personal Information of 200,000+ Exposed in Philippine School Voucher Program Portal Data Leak.

This is a post from HackRead.com Read the original post: Unsecured Database Leaks 153 GB of Filipino Student and Family Data

Security Leaks News Cybersecurity Data Breach LEAKS Misconfiguration Privacy Security
2024-02-20 17:22:00 UTC
HackRead
HackRead
Wyze Cameras Glitch: 13,000 Users Saw Footage from Others’ Homes

By Deeba Ahmed

Third-Party Library Blamed for Wyze Camera Security Lapse.

This is a post from HackRead.com Read the original post: Wyze Cameras Glitch: 13,000 Users Saw Footage from Others’ Homes

Security Privacy Breach Camera Cybersecurity Security Vulnerability Wyze

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
February 2024
By SUE DENIM
The Truth Behind "The Xun" Repository Bombshell
Well, well, well, it seems the digital waters are getting murkier by the day. A mysterious GitHub user by the name of I-SOON recently made their grand entrance onto the coding scene, dropping a repository bombshell titled "The Truth Behind an Xun." Inside? Oh, just a casual 200 megabytes of top-secret intel about a Chinese cybersecurity company. Talk about spilling the digital tea!

This treasur...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
26 February 2024
BREACHAWARE HQ

A total of 38 breaches were found and analysed resulting in 3,984,206 leaked accounts containing a total of 27 different data types. The breaches found publicly and freely available included Stealer Log 0248, Leonardo, Stealer Log 0249, Tangerine Telecom and Stealer Log 0250