Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-05-30 13:16:00 UTC
ThreatPost
ThreatPost
2.3B Files Exposed in a Year: A New Record for Misconfigs

Amazon S3 cloud bucket misconfigurations however have dropped dramatically.

Cloud Security Mobile Security Most Recent ThreatLists Privacy Amazon S3 Analysis Cloud Storage Digital Shadows Report Exposed Files GDPR Misconfiguration SMB Protocol
2019-05-30 13:01:00 UTC
Naked Security | Sophos
Naked Security | Sophos
The cryptominer that kept coming back

A Monero cryptominer made a home on an Apache Tomcat server and just wouldn't stay away.

Cryptocurrency Malware Security Threats Apache Apache Tomcat Brute Force Attack Cryptocurrency Cryptomining Monero XMrig
2019-05-30 12:07:00 UTC
Naked Security | Sophos
Naked Security | Sophos
New Zealand’s “hacked” budget was found on a website

Police close their investigation, concluding that New Zealand's "wellbeing" budget wasn't hacked.

Data Loss Government Security Security Threats Vulnerability Breach Budget Gabriel Makhlouf Grant Robertson National Party New Zealand Simon Bridges Treasury
2019-05-30 11:17:00 UTC
Naked Security | Sophos
Naked Security | Sophos
A million devices still vulnerable to ‘wormable’ RDP hole

An internet-wide scan has revealed almost one million devices vulnerable to CVE-2019-0708.

Microsoft Operating Systems Security Threats Vulnerability Windows BlueKeep CVE-2019-0708 Patch Tor Vulnerability WannaCry Worm
2019-05-30 11:12:00 UTC
The Daily Swig
The Daily Swig
Oman ramps up security efforts amid surge in malicious web traffic

Middle Eastern state recognized for continued commitment to protecting national infrastructure

2019-05-30 11:02:00 UTC
Naked Security | Sophos
Naked Security | Sophos
What a teen grade hacker’s confession can teach us

"We had access to the grade book. Now we could change the grades."

Data Loss Malware Security Threats Default Passwords Grade Hacking Grades Hacked Webcams Keyloggers Password Sharing Scam Academy Students
2019-05-29 21:00:00 UTC
Dark Reading
Dark Reading
Docker Vulnerability Opens Servers to Container Code

Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE.

2019-05-29 20:30:00 UTC
ThreatPost
ThreatPost
‘5G is Coming,’ But Can the Security Industry Keep Up?

What does 5G mean from a security vendor perspective? A Palo Alto Networks expert sounds off at GSMA's Mobile360 this week.

Hacks IoT Podcasts 5G GSMA Infosec Mobile 360 Security Self-driving Cars
2019-05-29 19:51:00 UTC
HackRead
HackRead
BEST VPN 2019: Do You Really Need It? This Will Help You Decide!

By Owais Sultan

When we connect to the Internet, we provide a considerable amount of information to our ISP and third-party advertisers. Although we use the incognito mode on the browser, protecting our privacy and preventing companies from tracking our online activity is complicated. If you are concerned about our privacy it is necessary to have a reliable […]

This is a post from HackRead.com Read the original post: BEST VPN 2019: Do You Really Need It? This Will Help You Decide!

Privacy Security Anonymity CyberGhost Encryption ExpressVPN NordVPN Security VPN
2019-05-29 19:45:00 UTC
Dark Reading
Dark Reading
Impersonation Attacks Up 67% for Corporate Inboxes

Nearly three-quarters of organizations hit with impersonation attacks experienced direct losses of money, customers, and data.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES