Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-12 19:56:00 UTC
Ars Technica
Ars Technica
Here’s how to see if you’re among the 30 million compromised Facebook users

The bad news: Private data was stolen. The good: Fewer accounts were affected.

Biz & IT Policy Data Breaches Facebook Privacy
2018-10-12 19:56:00 UTC
Ars Technica
Ars Technica
Here’s how to see if you’re among the 30 million compromised Facebook users

The bad news: Private data was stolen. The good: Fewer accounts were affected.

Biz & IT Policy Data Breaches Facebook Privacy
2018-10-12 19:38:00 UTC
ThreatPost
ThreatPost
Threatpost News Wrap Podcast For Oct. 12

Threatpost's editors discuss the top news of this week.

Podcasts Privacy Vulnerabilities Web Security Adobe Adobe Flash Facebook Google Google Plus Google+
2018-10-12 17:01:00 UTC
ThreatPost
ThreatPost
Microsoft Zero-Day Patch for JET Bug Incomplete, Claims Firm

The official update from Microsoft only limits the vulnerability, according to 0Patch.

Vulnerabilities CVE-2018-8423 Flawed Patch Jet Database Micropatch Microsoft Patch Tuesday Zero-day
2018-10-12 16:30:00 UTC
The Daily Swig
The Daily Swig
‘Online friends are not the same as real friends’

Equipping kids with the skills needed to stay safe online.

2018-10-12 15:42:00 UTC
HackRead
HackRead
Baby Got Bots

By Ian Trump

This is the first in a series of blog posts “on all things Bot.” From bad to good and looking towards the future, Bots remain an information security issue which has the potential to impact all commercial and recreational online activity. This series will explore the security and business ramifications of the modern internet where […]

This is a post from HackRead.com Read the original post: Baby Got Bots

Security Bots Cyber Security DDOS Infosec Internet IoT Mirai Security
2018-10-12 15:25:00 UTC
ThreatPost
ThreatPost
Shining a Light on a New Technique for Stealth Persistence

Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence.

Hacks InfoSec Insider Vulnerabilities BACE Backdoor Binaries That Allow Arbitrary Code Execution Foobar Red Team
2018-10-12 15:10:00 UTC
The Daily Swig
The Daily Swig
‘Get you a man that’s as bold as Facebook wanting to put an internet camera in your kitchen’

Top infosec trends in the social media spotlight this week.

2018-10-12 14:30:00 UTC
Dark Reading
Dark Reading
Threat Hunters & Security Analysts: A Dynamic Duo

Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.

2018-10-12 14:19:00 UTC
ThreatPost
ThreatPost
Facebook Bans More Than 800 Accounts in Disinformation Purge

The move comes a month before the November midterm elections – and at a time when all eyes are on Facebook to see how it protects against disinformation.

Facebook Web Security Banned Account Disinformation Facebook Privacy Fake News

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES