Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-11-06 16:52:00 UTC
ThreatPost
ThreatPost
Facebook Privacy Breach: 100 Developers Improperly Accessed Data

Facebook said that 100+ third-party app developers had access to restricted data for members of Groups, in its latest privacy snafu.

Facebook Privacy Cambridge Analytica Data Access Data Privacy Data Security Developers Facebook $5 Billion Facebook Fine FTC FTC Fine Groups Api Improper Access Names Profile Picture
2019-11-06 16:33:00 UTC
The Daily Swig
The Daily Swig
OWASP security projects showcased at All Day DevOps conference

SAMMv2, Juice Shop, and testing guide among topics covered during 24-hour security event

2019-11-06 16:26:00 UTC
ThreatPost
ThreatPost
DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks

The group was exposed after a ShadowBrokers leak.

Government Malware Advanced Persistent Threat Apt Darkuniverse Espionage Highly Targeted Itaduke Kaspersky Malware Analysis ShadowBrokers Leak. Spy Campaign
2019-11-06 15:00:00 UTC
Dark Reading
Dark Reading
The Uphill Battle of Triaging Alerts

Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it.

2019-11-06 14:30:00 UTC
ThreatPost
ThreatPost
Emotet Resurgence Continues With New Tactics, Techniques and Procedures

Since Emotet came out of hibernation last month, researchers are seeing the banking trojan's authors take on a consistent trend of new evasion tactics and social engineering techniques.

Hacks Malware Podcasts Emotet Malware Old Email Conversations Return Self Propagation Stolen Email Credentials Summer Hiatus
2019-11-06 14:26:00 UTC
The Daily Swig
The Daily Swig
Coalfire arrests: Charges against US pen testers reduced but not dropped

Security consultancy went outside scope of contract, claims sheriff

2019-11-06 14:00:00 UTC
ThreatPost
ThreatPost
Google Analytics Emerges as a Phishing Tool

Web analytics help phishers hone their attacks -- but website defenders can also use these tactics to better detect the scope of attacks and mitigate their effects.

Web Security Akamai Bing Cybercriminals Google Analytics Hackers Malicious Activity Phishing Phishing Tool Site Visitor Behavior Web Analytics Websites Yandex
2019-11-06 14:00:00 UTC
ThreatPost
ThreatPost
Presentation Template: Build Your 2020 Security Plan

The 2020 Security Plan PPT template helps security professionals engage their organization's decision-makers and gets their backing for critical security decisions.

Vulnerabilities CIOs CISOs Cyberattack Definitive 2020 Security Plan PPT Template Zero Day Exploits
2019-11-06 13:03:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Smartphone and speaker voice assistants can be hacked using lasers

Researchers have discovered that some voice assistants will accept “signal injection” commands sent to them using pulses of laser light.

Amazon Facebook Google Security Threats Vulnerability Alexa Facebook Portal Google Home Google Voice Assistant Lasers Signal Injection Siri
2019-11-06 12:34:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Mozilla says ISPs are lying to Congress about encrypted DNS

Mozilla on Friday posted a letter urging Congress to take the broadband industry's lobbying against encrypted DNS within Firefox and Chrome with a grain of salt.

Firefox Google Chrome Law & Order Mozilla Privacy Web Browsers Broadband Browsers Browsing Activity Browsing History Chrome Congress DNS DNS Encryption DNS-over-HTTPS DoH Domain Name Services Domain Name System Https ISPs Lobbyists Tracking

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES