Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-02 21:19:00 UTC
ThreatPost
ThreatPost
Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws

Foxit Software has patched over 100 vulnerabilities in its popular Foxit PDF Reader. Many of the bugs tackled by the company include a wide array of high severity remote code execution vulnerabilities. Foxit on Friday released fixes for Foxit Reader 9.3 and Foxit PhantomPDF 9.3, which addressed a whopping 124 vulnerabilities. It’s important to note […]

Vulnerabilities Web Security Adobe Arbitrary Code Arbitrary Code Execution Foxit Malicious File PDF Remote Code Execution
2018-10-02 21:00:00 UTC
Dark Reading
Dark Reading
Sharpen Your Security Skills at Black Hat Trainings Chicago!

Black Hat is bringing its highly-regarded Trainings to Chicago next month, October 22 and 23.Don't miss this opportunity to develop your skills in some of the most technical, hands-on security courses available.

2018-10-02 19:45:00 UTC
Dark Reading
Dark Reading
When Facebook Gets Hacked, Everyone Gets Hacked

Facebook's attackers may have gained access to several third-party apps and websites via Facebook Login.

2018-10-02 19:23:00 UTC
ThreatPost
ThreatPost
NOKKI Malware Sports Mysterious Link to Reaper APT Group

The relationship between the malware and the APT group remains somewhat murky.

Malware Apt 37 Deobfuscation Dogcall Malware Analysis North Korea Reaper Remote Access Trojan
2018-10-02 19:14:00 UTC
Dark Reading
Dark Reading
Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements

Two felony counts each carry a maximum 10-year prison sentence.

2018-10-02 17:30:00 UTC
HackRead
HackRead
Most Threatening DNS Security Risks And How To Avoid Them

By Zehra Ali

The DNS or Domain Name System is one of the most necessary components for the internet functionality. Most often, the internet businesses are negligent to the security of their digital identity that is the DNS. This poor security of DNS makes it vulnerable to many cyber attacks which are beneficial for the attackers. Fortunately, an […]

This is a post from HackRead.com Read the original post: Most Threatening DNS Security Risks And How To Avoid Them

Security Cyber Attack DDOS DNS Hacking Internet Privacy Security Technology
2018-10-02 17:20:00 UTC
Dark Reading
Dark Reading
The Award for Most Dangerous Celebrity Goes To ...

A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.

2018-10-02 17:20:00 UTC
Dark Reading
Dark Reading
The Award for Most Dangerous Celebrity Goes To …

A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.

2018-10-02 17:10:00 UTC
Ars Technica
Ars Technica
Google taking new steps to prevent malicious Chrome extensions

Company plans stricter rules for developers, and greater control for users.

Tech Chrome Development Extensions Google Open Source Security
2018-10-02 16:47:00 UTC
ThreatPost
ThreatPost
Google Patches Critical Vulnerabilities in Android OS

The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.

Mobile Security Privacy Vulnerabilities Android Open Source Project Android OS Trusted Execution Environment Google Huawei LG Nexus October Android Security Bulletin Pixel RCE Remote Code Execution Samsung

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES