Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-10-15 10:42:00 UTC
Naked Security | Sophos
Naked Security | Sophos
350+ hackers hunt down missing people in first such hackathon

Organizers said 100 leads were generated every 10 minutes by contestants using OSINT - open-source intelligence such as online searches.

Law & Order #AUCyberWeek2019 #AUMissingCTF2019 Australia Canberra Capture The Flag Cyber Security Innovation Node Hackathon Missing People National Australian Missing Persons Hackathon Open Source Intelligence Osint Trace Labs
2019-10-15 10:23:00 UTC
The Daily Swig
The Daily Swig
Crypto-exchange admins targeted with phishy Mac malware

Lazarus Group suspected in GitHub-hosted backdoor scam

2019-10-15 10:23:00 UTC
The Daily Swig
The Daily Swig
Crypto-exchange admins targeted with phishy malware

Lazarus Group suspected in GitHub-hosted backdoor scam

2019-10-15 10:23:00 UTC
The Daily Swig
The Daily Swig
Crypto-exchange admins targeted with malware-ridden trading app

Lazarus Group suspected in GitHub-hosted backdoor scam

2019-10-14 21:18:00 UTC
Dark Reading
Dark Reading
Cyber Theft, Humint Helped China Cut Corners on Passenger Jet

Beijing likely saved a lot of time and billions of dollars by copying components for its C919 plane from others, a new report from CrowdStrike says.

2019-10-14 21:15:00 UTC
Dark Reading
Dark Reading
Pitney Bowes Hit by Ransomware

The attack does not appear to have endangered customer data, but it has had an impact on orders for supplies and postage refills.

2019-10-14 14:00:00 UTC
Dark Reading
Dark Reading
The Connected Cybercrime Ecosystem & the Impact of the Capital One Breach

A company's security battle is not between that company and a specific fraudster; rather, it's between the company and connected cybercriminal ecosystem.

2019-10-14 13:50:00 UTC
The Daily Swig
The Daily Swig
Firefox vulnerable to trivial CSP bypass

Exploit allows potentially malicious content to bypass browser’s defenses

2019-10-14 12:22:00 UTC
ThreatPost
ThreatPost
Apple Shares Some Browsing History with Chinese Company

The company acknowledged it’s using ‘safe browsing’ technology from Tencent, which has ties to the Chinese government.

Government Privacy Web Security Apple Browsers Browsing China Google Safe Browsing Internet Ios Johns Hopkins University Matthew Green Safari Tencent Tom Parker Xi Jinping
2019-10-14 12:15:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Stalker found pop star by searching eyes’ reflections on Google Maps

A man confessed to stalking and attacking a young pop star by zooming in on the reflections in her eyes from selfies.

Google Law & Order Privacy Social Networks Assault Cyber Harassment Cyberbullying Cyberstalker Digital Stalker Google Map J-pop Japan Matsuoka Nagato Pop Star Sato Sexual Assault Stalker Street View

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES