Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-12 13:00:00 UTC
Dark Reading
Dark Reading
12 Free, Ready-to-Use Security Tools

There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.

2018-10-11 22:30:00 UTC
Dark Reading
Dark Reading
Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up

Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.

2018-10-11 21:50:00 UTC
Dark Reading
Dark Reading
Chinese Intelligence Officer Under Arrest for Trade Secret Theft

Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.

2018-10-11 21:30:00 UTC
Dark Reading
Dark Reading
Window Snyder Shares Her Plans for Intel Security

The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.

2018-10-11 21:11:00 UTC
ThreatPost
ThreatPost
FitMetrix Exposes Millions of Customer Details, Accessed by Criminals

Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.

Breach Cloud Security Privacy Web Security Cloud Storage Criminal Access Data Breach Elasticsearch Fitmetrix Gym Customers Misconfiguration Open Server Personal Information Public Access
2018-10-11 21:00:00 UTC
Dark Reading
Dark Reading
Most Malware Arrives Via Email

Watch out for messages with the word "invoice" in the subject line, too.

2018-10-11 20:24:00 UTC
ThreatPost
ThreatPost
New Drupalgeddon Attacks Enlist Shellbot to Open Backdoors

Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.

IoT Vulnerabilities Web Security CMS Content Management System Drupalgeddon 2.0 IRC MySQL Database Open Web Application Security Project PerlBot PowerBot Shellbot
2018-10-11 20:19:00 UTC
ThreatPost
ThreatPost
ThreatList: Credential Theft Spikes by Triple Digits in U.S.

Meanwhile, the LokiPWS (a.k.a. Lokibot) malware family distribution is surging.

Hacks Malware Most Recent ThreatLists Banking Trojan Blueliv Credential Stealing LokiBot Lokipws Malware Distribution Quarterly Report Theft
2018-10-11 18:36:00 UTC
HackRead
HackRead
Major weapon systems developed by US DoD highly vulnerable to cyber attacks

By Uzair Amir

Several Critical Vulnerabilities Identified in Major Weapon Systems Being Developed by US DoD. The advanced weapon systems developed by the US Department of Defense with a whopping estimated expenditure of $1.66 trillion are plagued with grave flaws, which make them a potential target for rivals looking to disrupt or control their functions. According to the […]

This is a post from HackRead.com Read the original post: Major weapon systems developed by US DoD highly vulnerable to cyber attacks

Security Cyber Attack Hacking Infosec Security USA Vulnerability Weapons
2018-10-11 18:30:00 UTC
Dark Reading
Dark Reading
Not All Multifactor Authentication Is Created Equal

Users should be aware of the strengths and weaknesses of the various MFA methods.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES