Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-12-03 11:11:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Ad fraud: Fake local news sites are rolling in the dough

"forbesbusinessinsider.com?" Names like that sound close enough to real news domains to pass, but bots are the only ones visiting.

Amazon Fake News Google Ad Fraud Ads Bots Click Fraud Fake News Google Ad Network Google Ads Seo
2019-12-03 10:39:00 UTC
The Daily Swig
The Daily Swig
Ransomware slingers ramp up attacks on back-up devices

NAS under assault

2019-12-02 21:00:00 UTC
ThreatPost
ThreatPost
Microsoft OAuth Flaw Opens Azure Accounts to Takeover

The Microsoft applications are vulnerable to an OAuth authentication flaw that could enable Azure account takeover.

Cloud Security Vulnerabilities Web Security Azure Identity Management Microsoft Microsoft Azure Microsoft Login Oauth Oauth Authentication
2019-12-02 19:13:00 UTC
ThreatPost
ThreatPost
Authorities Break Up Imminent Monitor Spyware Organization

The infrastructure behind a remote access tool (RAT) allowing full remote takeover of a victim machine has been dismantled.

Government Malware Arrests Australia Imminent Monitor Law Enforcement RAT Remote Access Tool Remote Takeover Shockwave Spyware Takedown Unit 42
2019-12-02 17:40:00 UTC
Dark Reading
Dark Reading
Data from 21M Mixcloud Users Compromised in Breach

The music streaming service received reports indicating attackers gained unauthorized access to its systems.

2019-12-02 17:08:00 UTC
The Daily Swig
The Daily Swig
Android vulnerability StrandHogg shatters user privacy, impacts top 500 apps

All versions of the Android mobile operating system are affected

2019-12-02 16:46:00 UTC
ThreatPost
ThreatPost
CISA Pushing U.S. Agencies to Adopt Vulnerability Disclosure Policies

A newly proposed CISA directive would require all U.S. agencies to develop and implement vulnerability disclosure processes for their internet connected systems.

Bug Bounty Government Vulnerabilities Bug Bounty CISA Cybersecurity And Infrastructure Security Agency Directive Hacker Us Agencies Vulnerability Vulnerability Disclosure White Hat Hacker
2019-12-02 15:33:00 UTC
ThreatPost
ThreatPost
Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds Warn

TV takeover, privacy threats, botnet concerns and Wi-Fi network compromise are all big concerns when it comes to connected TVs.

Government Hacks IoT Privacy Vulnerabilities Web Security Black Friday Sale Botnet Cyber Monday Device Takeover Fbi Warning Internet Of Things IoT Security Mirai Network Compromise Patches Smart TVs Vulnerabilities
2019-12-02 15:00:00 UTC
Dark Reading
Dark Reading
3 Modern Myths of Threat Intelligence

More intelligence does not lead to more security. Here's why.

2019-12-02 13:33:00 UTC
ThreatPost
ThreatPost
Insecure Database Exposes Millions of Private SMS Messages

Researchers discovered an unprotected TrueDialog database hosted by Microsoft Azure with diverse and business-related data from tens of millions of users.

Breach Cloud Security Privacy Data Breach Data Privacy Database Security Hosted Services Microsoft Microsoft Azure Oracle Security Small Businesses SMS Messages Telecommunications TrueDialog VpnMentor

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES