Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-07 11:45:00 UTC
Naked Security | Sophos
Naked Security | Sophos
IT exec sets up fake biz to scam his employer out of $6m

He cooked up an IT vendor, its invoices, its vapor-gear, and the phantom employees who never showed up to do all those services.

Law & Order Fraud Hicham Kabbaj Interactive Systems Metadata Microsoft Word Wire Fraud
2020-01-07 11:11:00 UTC
Naked Security | Sophos
Naked Security | Sophos
US military branches ban TikTok following Pentagon’s warning

The latest attempt to prove it's not under China's thumb: TikTok's first transparency report.

Government Security Law & Order Social Networks Ban China Cyber Espionage Government Security Mobile National Security Social Networks TikTok Transparency Report US Military
2020-01-06 23:20:00 UTC
Dark Reading
Dark Reading
Widely Known Flaw in Pulse Secure VPN Being Used in Ransomware Attacks

New Year's Eve attack on currency exchange service Travelex may have involved use of the flaw.

2020-01-06 22:20:00 UTC
Dark Reading
Dark Reading
Malicious Google Play Apps Linked to SideWinder APT

The active attack involving three malicious Android applications is the first exploiting CVE-2019-2215, Trend Micro researchers report.

2020-01-06 21:48:00 UTC
ThreatPost
ThreatPost
ToTok Returned to Google Play Despite ‘Spy Tool’ Claims

The communications app faces continued backlash after a New York Times report said it was used as a government spying tool.

Mobile Security Privacy App Store Apple Communications Google Google Play Totok
2020-01-06 21:47:00 UTC
ThreatPost
ThreatPost
Magecart Hits Parents and Students via Blue Bear Attack

The latest attack takes aim at a vertical-specific e-commerce platform.

Breach Malware Privacy Web Security Blue Bear Card Skimming E-commerce Education Magecart Supply Chain
2020-01-06 18:17:00 UTC
Krebs on Security
Krebs on Security
The Hidden Cost of Ransomware: Wholesale Password Theft

Organizations in the throes of cleaning up after a ransomware outbreak typically will change passwords for all user accounts that have access to any email systems, servers and desktop workstations within their network. But all too often, ransomware victims fail to grasp that the crooks behind these attacks can and frequently do siphon every single password stored on each infected endpoint. The result of this oversight may offer attackers a way back into the affected organization, access to financial and healthcare accounts, or -- worse yet -- key tools for attacking the victim's various business partners and clients.

A Little Sunshine Ransomware The Coming Storm Alex Holden Hold Security Karen Christianson Mark Schafer Ransomware Ryuk SVA Consulting VCPI
2020-01-06 17:20:00 UTC
Dark Reading
Dark Reading
US Government Publishing Office Website Defaced

The Federal Depository Library Program (FDLP) website was attacked by a group of hackers claiming to represent the government of Iran.

2020-01-06 17:13:00 UTC
ThreatPost
ThreatPost
DeathRansom Campaign Linked to Malware Cornucopia

One threat actor appears to be behind several ongoing, related campaigns.

Malware Azorult Deathransom Egor Nedugov Evrial FortiGuard Labs Malware Analysis Ongoing Campaigns Scat01 Vidat
2020-01-06 17:09:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Don’t fall for the “Start your 2020 with a gift from us” scam…

There is no free Macbook. There IS no free Macbook. There is NO free Macbook.

Phishing Spam Uncategorized Courier Courier Scam Phishing

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES