Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-05 17:14:00 UTC
ThreatPost
ThreatPost
Threatpost New Wrap Podcast For Oct. 5

Threatpost editors discuss the highlights and biggest breaking news from this past week.

Podcasts Amazon Apple Bloomberg BSIMM China Facebook Facebook Breach Podcast Routers Supermicro
2018-10-05 16:45:00 UTC
Dark Reading
Dark Reading
12 AppSec Activities Enterprises Can't Afford to Skip

The latest Building Security in Maturity Model (BSIMM9) report offers a statistically backed, bare-minimum benchmark for software security initiatives.

2018-10-05 16:16:00 UTC
ThreatPost
ThreatPost
Virus Bulletin 2018: Exposing the Social Media Fraud Ecosystem

The business of fake likes and followers turns out to be a sprawling enterprise -- likely tied back to IoT botnet activity.

Uncategorized Ecosystem Gosecure Influence Campaigns IoT Botnet Linux/moose Resellers Social Media Fraud Supply Chain Virus Bulletin 2018
2018-10-05 14:30:00 UTC
Dark Reading
Dark Reading
Who Do You Trust? Parsing the Issues of Privacy, Transparency & Control

Technology such as Apple's device trust score that decides "you" is "not you" is a good thing. But only if it works well.

2018-10-05 14:22:00 UTC
The Daily Swig
The Daily Swig
‘Check behind you – hackers are always watching’

Top infosec trends in the social media spotlight this week.

2018-10-05 12:33:00 UTC
HackRead
HackRead
Don’t ever use a VPN without paying attention to these five things

By John Mason

Ryan Lin was just recently sentenced to 17 years in prison. He was sentenced for committing a range of crimes including cyberstalking, computer fraud and abuse, aggravated identity theft, and distribution of child pornography. These are all serious crimes that I in no way support or condone, but why am I particularly interested in the […]

This is a post from HackRead.com Read the original post: Don’t ever use a VPN without paying attention to these five things

Privacy Security Cyber Crime DNS Security Surveillance VPN
2018-10-04 20:35:00 UTC
Dark Reading
Dark Reading
US Indicts 7 Russian Intel Officers for Hacking Anti-Doping Organizations

Netherlands expels four of the suspects trying to break into an organization investigating a chemical used in the recent attack on a former Russian spy in Britain.

2018-10-04 20:30:00 UTC
Dark Reading
Dark Reading
7 Steps to Start Your Risk Assessment

Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.

2018-10-04 19:30:00 UTC
Dark Reading
Dark Reading
Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards

If true, the attack using Supermicro motherboards could be the most comprehensive cyber breach in history.

2018-10-04 19:25:00 UTC
ThreatPost
ThreatPost
ThreatList: 83% of Routers Contain Vulnerable Code

Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.

IoT Vulnerabilities Web Security American Consumer Institute Belkin CCTV Cameras Cyberattacks D-Link DVRs Firmware Updates Linksys NAS Devices NETGEAR Routers Wi-Fi

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES