Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSEvidence shows that three of the most destructive incidents seen in modern cyber-history are the work of one APT.
By Waqas
Newly discovered Trojan malware, which has been dubbed as GPlayed by the IT security experts at Cisco Talos, disguises itself as Google Play Store to trick users into downloading it. After getting installed, it steals location information and bank details from the device. Additionally, it is capable of transferring code between desktop and mobile platforms. […]
This is a post from HackRead.com Read the original post: Malicious Platform Independent Trojan GPlayed Disguised as Google Play Store
Facebook's VP of product management was able to discuss more specifics about how the breach itself occurred.
It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.
By Carolina
Google Maps is full of surprises, primarily thanks to some of its funniest, creepiest, and strangest street view images. In 2013, a father found his son’s dead body image and crime scene on Google Maps but who could have imagined this seemingly harmless technology would force a married couple to divorce? A woman in Peru was […]
This is a post from HackRead.com Read the original post: Google Maps: Hubby divorces wife after finding her on Street View with another man
By Waqas
The IT security researchers at Palo Alto Networks has identified that a fake Flash updater is circulating the web and fooling computer users by sneakily installing cryptocurrency mining bot XMRig. In the past few months, researchers have identified 113 fake updaters installing cryptomining malware on targeted devices. The notorious updater is actively attacking computers since August […]
This is a post from HackRead.com Read the original post: Fake Adobe updates installing cryptomining malware while updating Flash
Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. alongside Tony Sager, senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. We talked at length about many issues, including supply chain security, and I asked Sager whether he'd heard anything about rumors that Supermicro -- a high tech firm in San Jose, Calif. -- had allegedly inserted hardware backdoors in technology sold to a number of American companies.
By Waqas
FBI has asked Facebook not to discuss who may be behind this attack. On September 28th, 2018 the social media giant Facebook announced that it suffered a massive data breach in which hackers stole access tokens of millions of accounts after exploiting a critical vulnerability in its “View As” feature. At that time, the estimate […]
This is a post from HackRead.com Read the original post: 30M Facebook breach; includes users phone numbers and location data
A survey of ICS security posture found outdated firewalls, improper segmentation password mistakes and more.
They cite five main reasons for wanting to move on - and what it would take to retain them.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.