Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSTurla hacking team abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization's messages.
The updated Add-on Policy aims to rid Firefox of third-party malicious code that hides what it's really up to.
It went down in flames, with a rogue admin blackmailing vendors and buyers and leaking login credentials and the IP address.
Singapore’s central bank sent a payment to Canada using blockchain technology last week, in a clear signal that the technology has value.
From malware-stuffed piracy apps to the Docker breach, get yourself up to date with everything we wrote last week - it's roundup time.
After researchers were able to bypass a file upload validation flaw patch in WP Live Chat, a new patch has been issued.
Scammers are figuring out unique ways of abusing cloud services to make their attacks look more genuine, Netskope says.
Armed with stolen credentials from another breach or from a misconfigured file, attackers delete developers' repositories on GitHub, Bitbucket, and GitLab, leaving behind ransom notes.
Snowballing attacks using a recently patched critical bug show no sign of abating.
Cisco patches two high-severity bugs that could be exploited by remote attackers.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.