Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-15 15:38:00 UTC
ThreatPost
ThreatPost
NotPetya Linked to Industroyer Attack on Ukraine Energy Grid

Evidence shows that three of the most destructive incidents seen in modern cyber-history are the work of one APT.

Critical Infrastructure Government Hacks Malware Apt BlackEnergy ESET Industroyer NotPetya One Threat Actor Power Grid Sandworm TeleBots Ukraine
2018-10-15 15:13:00 UTC
HackRead
HackRead
Malicious Platform Independent Trojan GPlayed Disguised as Google Play Store

By Waqas

Newly discovered Trojan malware, which has been dubbed as GPlayed by the IT security experts at Cisco Talos, disguises itself as Google Play Store to trick users into downloading it. After getting installed, it steals location information and bank details from the device. Additionally, it is capable of transferring code between desktop and mobile platforms. […]

This is a post from HackRead.com Read the original post: Malicious Platform Independent Trojan GPlayed Disguised as Google Play Store

Android Malware Security Google Play Store Scam Security
2018-10-15 14:35:00 UTC
ThreatPost
ThreatPost
Facebook Offers Details on ‘View As’ Breach, Revises Numbers

Facebook's VP of product management was able to discuss more specifics about how the breach itself occurred.

Breach Facebook Vulnerabilities Web Security Access Tokens Data Breach Facebook Breach Facebook Privacy Hack Privacy Security Social Media
2018-10-15 14:30:00 UTC
Dark Reading
Dark Reading
4 Ways to Fight the Email Security Threat

It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.

2018-10-14 00:24:00 UTC
HackRead
HackRead
Google Maps: Hubby divorces wife after finding her on Street View with another man

By Carolina

Google Maps is full of surprises, primarily thanks to some of its funniest, creepiest, and strangest street view images. In 2013, a father found his son’s dead body image and crime scene on Google Maps but who could have imagined this seemingly harmless technology would force a married couple to divorce? A woman in Peru was […]

This is a post from HackRead.com Read the original post: Google Maps: Hubby divorces wife after finding her on Street View with another man

Images Technology News Google Google Earth Google Maps Internet Privacy Technology
2018-10-13 14:25:00 UTC
HackRead
HackRead
Fake Adobe updates installing cryptomining malware while updating Flash

By Waqas

The IT security researchers at Palo Alto Networks has identified that a fake Flash updater is circulating the web and fooling computer users by sneakily installing cryptocurrency mining bot XMRig. In the past few months, researchers have identified 113 fake updaters installing cryptomining malware on targeted devices. The notorious updater is actively attacking computers since August […]

This is a post from HackRead.com Read the original post: Fake Adobe updates installing cryptomining malware while updating Flash

Malware Security Adobe Cryptocurrency Cryptojacking Flash Fraud Scam Security
2018-10-13 01:03:00 UTC
Krebs on Security
Krebs on Security
Supply Chain Security 101: An Expert’s View

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. alongside Tony Sager, senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. We  talked at length about many issues, including supply chain security, and I asked Sager whether he'd heard anything about rumors that Supermicro -- a high tech firm in San Jose, Calif. -- had allegedly inserted hardware backdoors in technology sold to a number of American companies.

A Little Sunshine The Coming Storm Blind Buy Bloomberg Businessweek Center For Internet Security Einstein Program Internet Of Things Supply Chain Security Tony Sager Trusted Internet Connections
2018-10-12 23:02:00 UTC
HackRead
HackRead
30M Facebook breach; includes users phone numbers and location data

By Waqas

FBI has asked Facebook not to discuss who may be behind this attack. On September 28th, 2018 the social media giant Facebook announced that it suffered a massive data breach in which hackers stole access tokens of millions of accounts after exploiting a critical vulnerability in its “View As” feature. At that time, the estimate […]

This is a post from HackRead.com Read the original post: 30M Facebook breach; includes users phone numbers and location data

Hacking News Breach Facebook Hacking Security Social Media Vulnerability
2018-10-12 21:09:00 UTC
ThreatPost
ThreatPost
ICS Security Plagued with Basic, Avoidable Mistakes

A survey of ICS security posture found outdated firewalls, improper segmentation password mistakes and more.

Critical Infrastructure Hacks Malware Vulnerabilities Best Practices Common Security Problems FireEye ICS Industrial Control Systems MANDIANT Passwords Targeted Attacks Triton Vulnerabilities
2018-10-12 21:00:00 UTC
Dark Reading
Dark Reading
Most IT Security Pros Want to Change Jobs

They cite five main reasons for wanting to move on - and what it would take to retain them.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES