Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-14 15:35:00 UTC
Dark Reading
Dark Reading
Consumer Reports Calls for IoT Manufacturers to Raise Security Standards

A letter to 25 companies says Consumer Reports will change ratings to reflect stronger security and privacy standards.

2020-01-14 15:25:00 UTC
Dark Reading
Dark Reading
Dustman Attack Underscores Iran's Cyber Capabilities

For nearly six months, an attack group linked to Iran reportedly had access to the network of Bahrain's national oil company, Bapco, before it executed a destructive payload.

2020-01-14 15:06:00 UTC
The Daily Swig
The Daily Swig
What is Sodinokibi? The ransomware behind the Travelex attack

We take a closer look at the ransomware-as-a-service model

2020-01-14 15:00:00 UTC
Dark Reading
Dark Reading
Processor Vulnerabilites Put Virtual Workloads at Risk

Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based apps

2020-01-14 15:00:00 UTC
Dark Reading
Dark Reading
Processor Vulnerabilities Put Virtual Workloads at Risk

Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based apps

2020-01-14 13:13:00 UTC
ThreatPost
ThreatPost
Apple Denies FBI Request to Unlock Shooter’s iPhone—Again

Refusal to unlock the phones of a Florida shooter could set up another legal battle between Apple and the Feds over data privacy in the case of criminal investigations.

Cryptography Government Mobile Security Apple Attorney General Data Privacy Department Of Justice FBI Iphone Passwords Privacy Shooting Terrorism William Barr
2020-01-14 12:27:00 UTC
The Daily Swig
The Daily Swig
Discord users warned over QR code login scam that can result in pwned accounts

Login window reduced to two minutes, but is this enough to combat fraudsters?

2020-01-14 11:41:00 UTC
Naked Security | Sophos
Naked Security | Sophos
‘Cable Haunt’ vulnerability exposes 200 million cable modem users

A fortnight in to 2020 and we have the first security flaw to be given its own name: Cable Haunt - complete with eye-catching logo.

Security Threats Vulnerability Broadcom Buffer Flaws Cable Haunt Cable Modem Flaw Lyrebirds Vulnerability
2020-01-14 11:31:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google tests biometric authentication for Android autofill

Google is testing out a feature to make Android's built-in password manager safer.

Android Google Mobile Operating Systems Autofill Bad Passwords Biometrics Password Manager Password Security
2020-01-14 11:18:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Lottery hacker gets 9 months for his £5 cut of the loot

We don't care how little you made from your crimes, the judge said. We care that you went after an outfit that gives a ton to charities.

Data Loss Law & Order Privacy Security Threats Anwar Batson Automated Password Guessing Brute Force Brute Force Attack Brute Force Tool Computer Misuse Act 1990 Cracking Credential Stuffing Daniel Thompson Dark Web Edwin Salter Hacking Tool Idris Akinwunmi Lottery National Lottery Password Reuse Rosegold Sentence Sentry MBA Stolen Credentials UK User Credentials

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES