Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-05-22 23:29:00 UTC
HackRead
HackRead
7 steps large companies are taking to safeguard against cybercrime

By Ryan De Souza

Cybercrime is on the rise with new exploits released every day along with new companies that simply aren’t prepared to defend against and deal with issues like data breaches and network-wide malware infections. Whether you’re a business person looking to improve company security, or just a curious party, you might be wondering how the largest […]

This is a post from HackRead.com Read the original post: 7 steps large companies are taking to safeguard against cybercrime

Security Cyber Attack Cyber Crime Hacking Malware Ransomware Security
2019-05-22 23:15:00 UTC
Dark Reading
Dark Reading
Alphabet's Chronicle Explores Code-Signing Abuse in the Wild

A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.

2019-05-22 22:30:00 UTC
Dark Reading
Dark Reading
New Software Skims Credit Card Info From Online Credit Card Transactions

The new exploit builds a fake frame around legitimate portions of an online commerce website.

2019-05-22 20:09:00 UTC
ThreatPost
ThreatPost
WannaCry-Infested Laptop Starts at $1.13M in Art Auction

The "bestiary" houses six historical threats that combined resulted in at least $95B in damages worldwide.

Malware Art Project Auction Bids BlackEnergy Dark Tequila Guo O Dong Iloveyou Malware MyDoom Persistence Of Chaos Samsung Netbook Sobig Virus Infected WannaCry
2019-05-22 19:26:00 UTC
Krebs on Security
Krebs on Security
Legal Threats Make Powerful Phishing Lures

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued, and instruct them to review the attached file and respond within a few days -- or else. Here's a look at a recent spam campaign that peppered more than 100,000 business email addresses with fake legal threats harboring malware.

Latest Warnings Target: Small Businesses The Coming Storm
2019-05-22 18:45:00 UTC
Dark Reading
Dark Reading
Baltimore Email, Other Systems Still Offline from May 7 Ransomware Attack

The city's mayor says there's no 'exact timeline on when all systems will be restored.'

2019-05-22 18:15:00 UTC
Dark Reading
Dark Reading
DDoS Attacks Up in Q1 After Months of Steady Decline

Sudden surge suggests that new actors have stepped up to the plate to replace the old operators.

2019-05-22 17:44:00 UTC
ThreatPost
ThreatPost
Critical Flaws in Khan Academy Opened Door to Account Takeovers

The two critical cross-site request forgery flaws in the online learning non-profit Khan Academy have been resolved.

Vulnerabilities Critical Flaw Cross-site Request Forgery Khan Academy Non Profit Patch Vulnerability
2019-05-22 15:58:00 UTC
HackRead
HackRead
Google says it stored some G Suite passwords in plain text for 14 years

By Uzair Amir

This issue is linked with G Suite users only while free consumer Google accounts remained unharmed. A couple of days ago it was reported that Google has been using Gmail to secretly store its users’ purchase history for years. Now, the company has revealed that its team recently discovered a bug due to which some […]

This is a post from HackRead.com Read the original post: Google says it stored some G Suite passwords in plain text for 14 years

Privacy Security Gmail Google Gsuite Password Security
2019-05-22 15:41:00 UTC
The Daily Swig
The Daily Swig
Flooding the market: Global DDoS attacks nearly double in Q1

Fresh insight reveals a dramatic increase in prolonged site outages

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES