Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-05 22:25:00 UTC
Dark Reading
Dark Reading
Mandia: Tipping Point Now Here for Rules of Cyber Engagement

FireEye CEO and nation-state hacking expert Kevin Mandia says Russia began changing the game in 2015.

2018-10-05 21:23:00 UTC
ThreatPost
ThreatPost
Sony Smart TV Bug Allows Remote Access, Root Privileges

Software patching becomes a new reality for smart TV owners.

IoT Vulnerabilities R5C Samsung Smart TV Sony Bravia TCL WD65 WD75 WE6 WE75 WF6 XE70 XF70
2018-10-05 20:43:00 UTC
ThreatPost
ThreatPost
Virus Bulletin 2018: Saudi Dissident Spyware Attack Belies Bigger Threat

A spyware attack on a Saudi dissident living in Canada made headlines this week, but Citizen Lab warns that simpler attacks are the real epidemic.

Government Malware Mobile Security Privacy Citizen Lab Civil Society Cyber Attacks Dissidents Epidemic NSO Group Pegasus Phishing Spyware Virus Bulletin 2018
2018-10-05 20:30:00 UTC
Dark Reading
Dark Reading
Most Home Routers Are Full of Vulnerabilities

More than 80% of surveyed routers had, on average, 172 security vulnerabilities, new research shows.

2018-10-05 19:45:00 UTC
Krebs on Security
Krebs on Security
Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

From time to time, there emerge cybersecurity stories of such potential impact that they have the effect of making all other security concerns seem minuscule and trifling by comparison. Yesterday was one of those times. Bloomberg Businessweek on Thursday published a bombshell investigation alleging that Chinese cyber spies had used a U.S.-based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. There aren't any corroborating accounts of this scoop so far, but it is both fascinating and terrifying to look at why threats to the global technology supply chain can be so difficult to detect, verify and counter.

A Little Sunshine Latest Warnings
2018-10-05 19:07:00 UTC
ThreatPost
ThreatPost
D-Link Patches RCE Bugs in Wireless Access Point Gear

 D-Link has released the beta version of the controller which addresses the reported vulnerabilities.

Vulnerabilities Cross-site Scripting CVE-2018-17440 CVE-2018-17441 CVE-2018-17442 CVE-2018-17443 D-Link FTP Remote Code Execution
2018-10-05 18:30:00 UTC
Dark Reading
Dark Reading
Successful Scammers Call After Lunch

Analysis of 20,000 voice phishing, or vishing, calls reveals patterns in how hackers operate.

2018-10-05 17:14:00 UTC
ThreatPost
ThreatPost
Threatpost New Wrap Podcast For Oct. 5

Threatpost editors discuss the highlights and biggest breaking news from this past week.

Podcasts Amazon Apple Bloomberg BSIMM China Facebook Facebook Breach Podcast Routers Supermicro
2018-10-05 16:45:00 UTC
Dark Reading
Dark Reading
12 AppSec Activities Enterprises Can't Afford to Skip

The latest Building Security in Maturity Model (BSIMM9) report offers a statistically backed, bare-minimum benchmark for software security initiatives.

2018-10-05 16:16:00 UTC
ThreatPost
ThreatPost
Virus Bulletin 2018: Exposing the Social Media Fraud Ecosystem

The business of fake likes and followers turns out to be a sprawling enterprise -- likely tied back to IoT botnet activity.

Uncategorized Ecosystem Gosecure Influence Campaigns IoT Botnet Linux/moose Resellers Social Media Fraud Supply Chain Virus Bulletin 2018

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES