Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-10-21 18:00:00 UTC
Dark Reading
Dark Reading
Researchers Turn Alexa and Google Home Into Credential Thieves

Eight Amazon Alexa and Google Home apps were approved for official app stores even though their actual purposes were eavesdropping and phishing.

2019-10-21 17:52:00 UTC
ThreatPost
ThreatPost
Turla Compromises, Infiltrates Iranian APT Infrastructure

The Russian-speaking APT stole the Neuron and Nautilus implants and accessed the Iranian APT's C2 infrastructure.

Hacks Apt 34 Infiltrate Iranian Apt Middle East Targets Nautilus Neuron Snake Stolen Implants Turla
2019-10-21 16:05:00 UTC
The Daily Swig
The Daily Swig
Nostromo web servers exposed by resurrected RCE vulnerability

Long-since patched security bug comes back to haunt devs

2019-10-21 15:33:00 UTC
ThreatPost
ThreatPost
Avast Network Breached As Hackers Target CCleaner Again

Avast said it believes that threat actors are again looking to target CCleaner in a supply chain attack.

Breach Hacks Antivirus Avast Breach CCleaner Ccleaner 2017 Attack Network Security VPN
2019-10-21 14:46:00 UTC
The Daily Swig
The Daily Swig
Avast claims success in thwarting ‘copycat’ CCleaner hack

Attackers breached systems through unsecured VPN, says software maker

2019-10-21 14:30:00 UTC
Dark Reading
Dark Reading
SOC Operations: 6 Vital Lessons & Pitfalls

There is no one road to security operations success, but these guidelines will smooth your path.

2019-10-21 11:48:00 UTC
The Daily Swig
The Daily Swig
‘Cybersecurity is more than just protecting devices’

Kaspersky security researcher David Emm on threat detection, industry challenges, and ‘cyber-immunity’

2019-10-21 11:47:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Don’t look now, but Pixel 4’s Face Unlock works with eyes closed

There's a risk that someone might get hold of a device and unlock it by holding the screen to the face of its sleeping or unconscious owner.

Android Google Mobile Security Threats Biometrics Face ID Face Unlock Facial Recognition Google Pixel Pixel 4
2019-10-21 11:22:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Samsung Galaxy S10 fingerprint reader beaten by $3 gel protector

The fingerprint reader on Samsung’s flagship S10 and Note10 smartphones can be spoofed with a $3 screen protector.

Samsung Security Threats Vulnerability Biometrics Fingerprint Reader Samsung Note 10 Samsung S10
2019-10-21 11:03:00 UTC
ThreatPost
ThreatPost
New Way Found to Use Alexa, Google to ‘Voice Phish’ and Eavesdrop on Users

Developer interfaces used by Security Research Labs researchers to turn digital home assistants into ‘Smart Spies’.

Hacks Privacy Alexa Amazon Data Privacy Digital Home Assistants Google Google Home Security Research Labs Smart Spies Vishing

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES