Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-09 21:24:00 UTC
ThreatPost
ThreatPost
Microsoft Patches Zero-Day Under Active Attack by APT

A zero-day vulnerability tied to the Window’s Win32k component is under active attack, warns Microsoft.

Vulnerabilities CVE-2010-3190 Excel Exchange Server FruityArmor Microsoft Foundation Class Library October Patch Tuesday Office Suite Outlook Powerpoint
2018-10-09 20:45:00 UTC
Dark Reading
Dark Reading
Constructing the Future of ICS Cybersecurity

As industrial control systems are connected to the cloud and the IoT, experts discuss security challenges.

2018-10-09 19:45:00 UTC
Dark Reading
Dark Reading
Microsoft Fixes Privilege Escalation 0Day Under Active Attack

This month's Patch Tuesday includes 49 patches, two of which are ranked Critical, and two security advisories.

2018-10-09 19:37:00 UTC
ThreatPost
ThreatPost
New Ninth-Gen Intel CPUs Shield Against Some Spectre, Meltdown Variants

New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants.

Vulnerabilities CPU Intel Intel Cannonlake L1TF Meltdown Spectre Virtual Fences
2018-10-09 18:40:00 UTC
ThreatPost
ThreatPost
Slideshow: Intel from Virus Bulletin 2018

This year's Virus Bulletin conference featured top-tier research from some of the world's best threat intelligence experts.

Breach Cloud Security Critical Infrastructure Government Hacks Malware Mobile Security Privacy Slideshow Web Security Apt Cybersecurity Research Espionage Malware Montreal Photo Gallery Slider Threat Intelligence Virus Bulletin 2018
2018-10-09 18:30:00 UTC
Dark Reading
Dark Reading
Lessons Learned from the Facebook Breach: Why Logic Errors Are So Hard to Catch

By ensuring that each layer of protection scours an application for unintended uses, you can find the flaws before the bad guys do.

2018-10-09 18:00:00 UTC
Dark Reading
Dark Reading
DoD Weapon Systems Contain Security Vulnerabilities

GAO report outlines challenges for the US Department of Defense to handle security flaws in weapon systems.

2018-10-09 17:37:00 UTC
HackRead
HackRead
MikroTik router vulnerability lets hackers bypass firewall to load malware undetected

By Waqas

Tenable Research’s cybersecurity researcher has released “By The way,” which is a new PoC (proof-of-concept) RCE attack after identifying a new attack method to exploit an already discovered vulnerability in MikroTik routers. The vulnerability, identified as CVE-2018-14847, is an old directory traversal flaw, which was patched the same day it was detected in April, 2018. […]

This is a post from HackRead.com Read the original post: MikroTik router vulnerability lets hackers bypass firewall to load malware undetected

Malware Security Internet MikroTik Router Security Vulnerability
2018-10-09 15:26:00 UTC
ThreatPost
ThreatPost
How Shared Pools of Cloud Computing Power Are Changing the Way Attackers Operate

Cloud computing is creating new challenges among security professionals as attackers embrace the "as-a-service model", giving unsophisticated cybercriminals a leg up in carrying out attacks.

Cloud Security InfoSec Insider Web Security DDoS-as-a-service Infosec Insider
2018-10-09 15:11:00 UTC
ThreatPost
ThreatPost
Google+ Privacy Snafu Leaves a Cloud Over the Tech Landscape

Google was caught not disclosing a potential data breach -- leaving questions as to whether a lack of transparency is the new normal.

Breach Cloud Security Facebook Privacy Api Flaw Data Breach Disclosure Google Google+ Personal Information Project Strobe Transparency

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES