Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSDropper malware become more popular as hackers turn to more quiet attack techniques to avoid detection.
An attempt to crack Tor was one of many projects hackers discovered when they broke into Russian intelligence contractor SyTech.
Not all phishes contain easily spotted errors or obviously dodgy web links - here's how to stay safe...
A Spearphone attacker can use the accelerometer in LG and Samsung phones to remotely eavesdrop on any audio that's played on speakerphone, including calls, music and voice assistant responses.
Hack like the GRU
A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution.
A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution.
At some dark moment, have you ever wondered: what if the programmers are adding the bugs deliberately?
Nations commit to information exchange agreement
A security clanger has been spotted in the current beta version of iOS 13 which allows anyone to access a user’s stored web and app passwords without having to authenticate.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.