Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-02 19:14:00 UTC
Dark Reading
Dark Reading
Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements

Two felony counts each carry a maximum 10-year prison sentence.

2018-10-02 17:30:00 UTC
HackRead
HackRead
Most Threatening DNS Security Risks And How To Avoid Them

By Zehra Ali

The DNS or Domain Name System is one of the most necessary components for the internet functionality. Most often, the internet businesses are negligent to the security of their digital identity that is the DNS. This poor security of DNS makes it vulnerable to many cyber attacks which are beneficial for the attackers. Fortunately, an […]

This is a post from HackRead.com Read the original post: Most Threatening DNS Security Risks And How To Avoid Them

Security Cyber Attack DDOS DNS Hacking Internet Privacy Security Technology
2018-10-02 17:20:00 UTC
Dark Reading
Dark Reading
The Award for Most Dangerous Celebrity Goes To ...

A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.

2018-10-02 17:20:00 UTC
Dark Reading
Dark Reading
The Award for Most Dangerous Celebrity Goes To …

A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.

2018-10-02 17:10:00 UTC
Ars Technica
Ars Technica
Google taking new steps to prevent malicious Chrome extensions

Company plans stricter rules for developers, and greater control for users.

Tech Chrome Development Extensions Google Open Source Security
2018-10-02 16:47:00 UTC
ThreatPost
ThreatPost
Google Patches Critical Vulnerabilities in Android OS

The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.

Mobile Security Privacy Vulnerabilities Android Open Source Project Android OS Trusted Execution Environment Google Huawei LG Nexus October Android Security Bulletin Pixel RCE Remote Code Execution Samsung
2018-10-02 16:30:00 UTC
Dark Reading
Dark Reading
Stop Saying 'Digital Pearl Harbor'

Yes, there are serious dangers posed by malevolent nation-states. But the hype is distracting us from the reality of the threats.

2018-10-02 16:15:00 UTC
HackRead
HackRead
Meet GhostDNS: The dangerous malware behind IoT botnet targeting banks

By Waqas

Security researchers at NetLab, a sub-division of the Chinese cybersecurity firm Qihoo 360, have discovered a new, wide-scale, and very active malware campaign that has managed to hijack more than 100,000 home routers between Sept 21 and 27. A majority of routers (almost 88%) are located in Brazil. The malware has been dubbed GhostDNS. Once […]

This is a post from HackRead.com Read the original post: Meet GhostDNS: The dangerous malware behind IoT botnet targeting banks

Malware Security Botnet DNS GhostDNS Hacking IoT Security
2018-10-02 14:57:00 UTC
The Daily Swig
The Daily Swig
US Department of Energy invests $28m in cybersecurity

Eleven new projects will help protect the country’s critical infrastructure.

2018-10-02 14:49:00 UTC
ThreatPost
ThreatPost
Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration

The free online office suite software is used by more than 30 million people and is a ripe target for criminals.

Cloud Security Malware Privacy Data Exfiltration Email Keylogger Malware Analysis Platform Abuse Zoho

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES