Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-06-25 14:29:00 UTC
HackRead
HackRead
Researchers exploit LTE flaws to send 50,000 fake presidential alerts

By Waqas

Researchers managed to cover a 50,000 seat football stadium using only four malicious portable stations. A group of security researchers from the University of Colorado Boulder has published a paper detailing the findings of their latest research revealing that LTE vulnerabilities can help attackers send out fake presidential alerts. To do this, they only need […]

This is a post from HackRead.com Read the original post: Researchers exploit LTE flaws to send 50,000 fake presidential alerts

Security Android IOS LTE Security Vulnerability
2019-06-25 14:28:00 UTC
Krebs on Security
Krebs on Security
Tracing the Supply Chain Attack on Android

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn't exactly name those responsible, but said it believes the offending vendor uses the nicknames "Yehuo" or "Blazefire." What follows is a deep dive into the identity of that Chinese vendor, which appears to have a long and storied history of pushing the envelope on mobile malware.

Breadcrumbs Ne'er-Do-Well News The Coming Storm Blazefire Chinese Software Developer Network Chuda Haagen Hagen Hsu Heng Hummer Trojan Shanghai Blazefire Network Technology Co Ltd. Shanghai Bronze Network Technology Co. Ltd. Shanghai Qianyou Network Technology Co. Ltd. Shanghai Tongjue Network Technology Co. Ltd. Shanghai Wildfire Network Technology Co. Ltd. Tosaka1027@gmail.com Triada Malware Wildfire Yehuo
2019-06-25 14:00:00 UTC
Dark Reading
Dark Reading
The Rise of Silence and the Fall of Coinhive

Cryptomining will exist as long as it remains profitable. One of the most effective ways to disrupt that activity is to make it too expensive to run cryptomining malware in your network.

2019-06-25 13:37:00 UTC
The Daily Swig
The Daily Swig
Using the ATT&CK framework to discover exploit dependency chains

Finding dependencies between adversary techniques can allow security teams to better optimize their defenses, according to Mitre Corporation’s Andy Applebaum

2019-06-25 12:03:00 UTC
HackRead
HackRead
10 risky apps that you need to monitor on your kids’ smartphone

By Owais Sultan

Parents should know if their under 18 child has these apps on their smartphone – No underage child should use these apps. Apart from being a great invention, smartphones are also taken as a most apt tool for killing time. Kids between the age of 11-19 spend 90 percent of their times on their cell […]

This is a post from HackRead.com Read the original post: 10 risky apps that you need to monitor on your kids’ smartphone

Cyber Crime Privacy Scams And Fraud Bullying Cyber Bullying Fraud Internet Pedophiles Scam Security
2019-06-25 12:03:00 UTC
HackRead
HackRead
9 risky apps that you need to monitor on your kids’ smartphone

By Owais Sultan

Parents should know if their under 18 child has these apps on their smartphone – No underage child should use these apps. Apart from being a great invention, smartphones are also taken as a most apt tool for killing time. Kids between the age of 11-19 spend 90 percent of their times on their cell […]

This is a post from HackRead.com Read the original post: 9 risky apps that you need to monitor on your kids’ smartphone

Cyber Crime Privacy Scams And Fraud Bullying Cyber Bullying Fraud Internet Pedophiles Scam Security
2019-06-25 11:31:00 UTC
The Daily Swig
The Daily Swig
State-sponsored hacking campaign targets global telcos

Operation Soft Cell said to impact millions Millions of consumers have had their phone records and identities compromised as part of an advanced nation-state hacking campaign that has been targeting g

2019-06-25 11:22:00 UTC
Naked Security | Sophos
Naked Security | Sophos
WeTransfer sends user file links to wrong people

Popular file transfer service WeTransfer faces embarrassment this week after admitting that it had mailed file links to the wrong users.

Data Loss Privacy Security Threats Data Loss Encryption File Transfer WeTransfer
2019-06-25 10:48:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Presidential text alerts are open to spoofing attacks, warn researchers

Researchers have shown that it’s technically possible for hackers to target the US Presidential text Alerts system to send fake messages.

Government Security Security Threats Vulnerability Alerts Federal Emergency Management Agency (FEMA) Presidential Alerts Spoofing Text Message Wireless Emergency Alerts (WEA)
2019-06-25 10:47:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Government agencies still send sensitive files via hackable .zips

Senator Ron Wyden has written to NIST asking for guidance and training for government staff in how to share files securely.

Cryptography Government Security Security Threats .zip Files Encryption Espionage File-sharing Hack Back Nist Sharing Files Weak Encryption ZIP

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES