Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-12-31 15:32:00 UTC
The Daily Swig
The Daily Swig
Bug Bounty Radar // December 2019

New web targets for the discerning hacker

2019-12-31 15:00:00 UTC
Dark Reading
Dark Reading
Operational Technology: Why Old Networks Need to Learn New Tricks

Cybercriminals are maximizing their opportunity by targeting older vulnerabilities in OT environments. It's time to fight back.

2019-12-31 14:00:00 UTC
ThreatPost
ThreatPost
7 Tips for Maximizing Your SOC

Use the seven points listed above to create an effective and efficient operational workflow and, importantly, happier analysts who aren't buried at the bottom of a pile of mostly irrelevant data.

Hacks InfoSec Insider Malware Vulnerabilities Chris Calvert Infosec Insider Maximizing Respond Software Security Operations Center SOC Top Tips
2019-12-31 11:01:00 UTC
ThreatPost
ThreatPost
2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Cloud Security Critical Infrastructure IoT Malware Mobile Security Slideshow Vulnerabilities Web Security 5G AppSec Deep Fakes DevOppSec DevOpsSec End-of-life Insider Threats MFA Bypass Ransomware Slideshow Windows 7
2019-12-31 11:00:00 UTC
HackRead
HackRead
Online Privacy: What to Expect in 2020

By Uzair Amir

Without much ado, let's see what to expect in the world of online privacy in 2020 and how to prepare for the new changes. 

This is a post from HackRead.com Read the original post: Online Privacy: What to Expect in 2020

News CCPA GDPR Privacy Security Technology
2019-12-31 10:45:00 UTC
The Daily Swig
The Daily Swig
First externally discovered flaws in Microsoft Edge (Chromium) uncovered

Researcher earns $40k

2019-12-30 18:24:00 UTC
HackRead
HackRead
Most second-hand phones contain previous owner’s data

By Sudais

Here's why you should avoid buying or selling second-hand phones or what to do before selling your smartphone to someone.

This is a post from HackRead.com Read the original post: Most second-hand phones contain previous owner’s data

Privacy Technology News Scam Security Smartphone Spying
2019-12-30 17:39:00 UTC
HackRead
HackRead
Smart TVs make screenshots every second & send them to the server

By David Balaban

There are a lot of unexpansive smart TVs on the market. Have you ever thought about why they got so cheap?

This is a post from HackRead.com Read the original post: Smart TVs make screenshots every second & send them to the server

Privacy Surveillance IoT Security Smart TV Technology
2019-12-30 17:29:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Celebrity addresses posted online in New Year’s Honours List leak

Too much information.

Privacy Data Leak

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES