Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-12 15:25:00 UTC
ThreatPost
ThreatPost
Shining a Light on a New Technique for Stealth Persistence

Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence.

Hacks InfoSec Insider Vulnerabilities BACE Backdoor Binaries That Allow Arbitrary Code Execution Foobar Red Team
2018-10-12 15:10:00 UTC
The Daily Swig
The Daily Swig
‘Get you a man that’s as bold as Facebook wanting to put an internet camera in your kitchen’

Top infosec trends in the social media spotlight this week.

2018-10-12 14:30:00 UTC
Dark Reading
Dark Reading
Threat Hunters & Security Analysts: A Dynamic Duo

Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.

2018-10-12 14:19:00 UTC
ThreatPost
ThreatPost
Facebook Bans More Than 800 Accounts in Disinformation Purge

The move comes a month before the November midterm elections – and at a time when all eyes are on Facebook to see how it protects against disinformation.

Facebook Web Security Banned Account Disinformation Facebook Privacy Fake News
2018-10-12 13:00:00 UTC
Dark Reading
Dark Reading
12 Free, Ready-to-Use Security Tools

There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.

2018-10-11 22:30:00 UTC
Dark Reading
Dark Reading
Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up

Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.

2018-10-11 21:50:00 UTC
Dark Reading
Dark Reading
Chinese Intelligence Officer Under Arrest for Trade Secret Theft

Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.

2018-10-11 21:30:00 UTC
Dark Reading
Dark Reading
Window Snyder Shares Her Plans for Intel Security

The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.

2018-10-11 21:11:00 UTC
ThreatPost
ThreatPost
FitMetrix Exposes Millions of Customer Details, Accessed by Criminals

Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.

Breach Cloud Security Privacy Web Security Cloud Storage Criminal Access Data Breach Elasticsearch Fitmetrix Gym Customers Misconfiguration Open Server Personal Information Public Access
2018-10-11 21:00:00 UTC
Dark Reading
Dark Reading
Most Malware Arrives Via Email

Watch out for messages with the word "invoice" in the subject line, too.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES