Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-05 22:45:00 UTC
Dark Reading
Dark Reading
Ransomware Used in Multimillion-Dollar Attacks Gets More Automated

The authors of MegaCortex appear to have traded security for convenience and speed, say researchers at Accenture iDefense.

2019-08-05 21:29:00 UTC
HackRead
HackRead
5 Free Best Internet Speed Test Websites

By Uzair Amir

There are tons of websites currently allowing users to check their Internet speed but only a few show accurate and authentic results. For your ease, we have completed a list of 10 of the best Internet speed test websites.

This is a post from HackRead.com Read the original post: 5 Free Best Internet Speed Test Websites

Technology News DNS Internet Technology VPN
2019-08-05 21:20:00 UTC
Dark Reading
Dark Reading
Destructive Malware Attacks Up 200% in 2019

Organizations hit with destructive malware can lose more than 12,000 machines and face $200 million or more in costs, IBM X-Force reports.

2019-08-05 19:31:00 UTC
ThreatPost
ThreatPost
E3 Website Leaks Private Addresses for Thousands of Journalists

Personal data of 2,000 journalists was found publicly accessible on a spreadsheet on the website for popular trade show E3.

Breach Privacy Vulnerabilities Web Security Contact Information Content Creators Data Breach Data Leak Data Security Doxxed E3 2019 E3 Trade Show Home Addresses Journalist Online Security Private Residences Web Security
2019-08-05 18:00:00 UTC
Dark Reading
Dark Reading
Database of 200M-Plus Potential 'Sextortion' Victims Published

Researchers have discovered a botnet (and the database it feeds on) dedicated to extortion schemes.

2019-08-05 17:39:00 UTC
ThreatPost
ThreatPost
Puzzling Gwmndy Botnet Focuses on Low-Volume Proxy Connections

After infecting Fiberhome routers, its sole purpose seems to be setting up SOCKS5 proxies.

IoT Malware Web Security Botnet Fiberhome Routers Gwmndy Socks5 Proxy Ssh Tunneling
2019-08-05 16:00:00 UTC
ThreatPost
ThreatPost
Microsoft Lab Offers $300K For Working Azure Exploits

Microsoft says its Azure Security Lab will allow researchers to attack its cloud environment in a customer-safe way.

Black Hat Cloud Security Vulnerabilities Azure Azure Cloud Security Azure Security Lab Black Hat USA 2019 Bug Bounty Exploit Microsoft
2019-08-05 15:25:00 UTC
The Daily Swig
The Daily Swig
Google lifts the veil on Chrome cache partition plans

‘Cookie curtain’ offers security and privacy benefits

2019-08-05 14:49:00 UTC
ThreatPost
ThreatPost
Google and ARM Tackle Android Bugs with Memory-Tagging

Buffer overflows, race conditions, use-after-free and more account for more than half of all vulnerabilities in the Android platform.

Mobile Security Vulnerabilities Android ARM Bug Detection Google Hardware Feature Memory Safety Memory Tagging Extension Mte Partnership
2019-08-05 14:20:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google and Apple suspend contractor access to voice recordings

Apple and Google have announced that they will limit the way audio recorded by their voice assistants, Siri and Google Assistant, are accessed internally by contractors.

Google Privacy Alexa Amazon Apple Apple Watch Google Assistant Siri Smart Speakers Voice

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES