Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSEight Amazon Alexa and Google Home apps were approved for official app stores even though their actual purposes were eavesdropping and phishing.
The Russian-speaking APT stole the Neuron and Nautilus implants and accessed the Iranian APT's C2 infrastructure.
Long-since patched security bug comes back to haunt devs
Avast said it believes that threat actors are again looking to target CCleaner in a supply chain attack.
Attackers breached systems through unsecured VPN, says software maker
There is no one road to security operations success, but these guidelines will smooth your path.
Kaspersky security researcher David Emm on threat detection, industry challenges, and ‘cyber-immunity’
There's a risk that someone might get hold of a device and unlock it by holding the screen to the face of its sleeping or unconscious owner.
The fingerprint reader on Samsung’s flagship S10 and Note10 smartphones can be spoofed with a $3 screen protector.
Developer interfaces used by Security Research Labs researchers to turn digital home assistants into ‘Smart Spies’.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.