Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-02-07 11:57:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Chrome extension warns users their login credentials have been breached

Google's released a Chrome extension, Password Checkup, that's designed to warn users when they enter a username and password the company has detected in a data breach.

Google Bad Passwords Data Breach Firefox Monitor Have I Been Pwned K-anonymity RSA Blinding
2019-02-07 11:40:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Unlimited crypotocurrency? Zcash fixes counterfeiting flaw

Privacy-focused cryptocurrency Zcash has fixed a flaw that would have allowed anyone with knowledge of it to produce counterfeit currency.

Cryptocurrency Cryptocurrency Sapling Sprout Zcash
2019-02-06 22:14:00 UTC
ThreatPost
ThreatPost
MacOS Zero-Day Exposes Apple Keychain Passwords

A researcher who discovered a flaw letting him steal passwords in MacOS is not sharing his findings with Apple without a macOS bug bounty program.

Mobile Security Vulnerabilities Apple Apple Bug Bug Bounty Ios MacOS Zero Day
2019-02-06 21:31:00 UTC
Ars Technica
Ars Technica
Windows 7 Extended Security Updates will double in price each year

Three years of updates will be available.

Tech Microsoft Security Support Windows
2019-02-06 21:05:00 UTC
Dark Reading
Dark Reading
Some Airline Flight Online Check-in Links Expose Passenger Data

Several airlines send unencrypted links to passengers for flight check-in that could be intercepted by attackers to view passenger and other data, researchers found.

2019-02-06 20:40:00 UTC
Dark Reading
Dark Reading
Consumers Care About Security - Sometimes

New RSA Security survey shows a generation gap in concerns over cybersecurity and privacy.

2019-02-06 19:30:00 UTC
Dark Reading
Dark Reading
4 Practical Questions to Ask Before Investing in AI

A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.

2019-02-06 17:51:00 UTC
ThreatPost
ThreatPost
Clever Phishing Attack Enlists Google Translate to Spoof Login Page

A tricky two-stage phishing scam is targeting Facebook and Google credentials using a landing page that hides behind Google's translate feature.

Web Security Credential Stuffing Credential Theft Facebook Google Google Translate Phishing Phishing Scam
2019-02-06 16:48:00 UTC
The Daily Swig
The Daily Swig
Washington state proposes privacy legislation as data debate heats up

Bill takes a leaf out of GDPR’s book

2019-02-06 16:25:00 UTC
ThreatPost
ThreatPost
What are Data Manipulation Attacks, and How to Mitigate Against Them

Hackers don't always steal data. Sometimes the goal is to manipulate the data to intentionally trigger external events that can be capitalized on.

Cloud Security Hacks InfoSec Insider Business Data Integrity Data Integrity Data Manipulation Data Manipulation Attack Endpoint Protection Endpoint Visibility MITRE ATT&CK Framework Supply Chain Attack Tesla

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
21 October 2024
BREACHAWARE HQ
Island Breach Exposure Monitoring