Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-10-02 17:10:00 UTC
Ars Technica
Ars Technica
Google taking new steps to prevent malicious Chrome extensions

Company plans stricter rules for developers, and greater control for users.

Tech Chrome Development Extensions Google Open Source Security
2018-10-02 16:47:00 UTC
ThreatPost
ThreatPost
Google Patches Critical Vulnerabilities in Android OS

The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.

Mobile Security Privacy Vulnerabilities Android Open Source Project Android OS Trusted Execution Environment Google Huawei LG Nexus October Android Security Bulletin Pixel RCE Remote Code Execution Samsung
2018-10-02 16:30:00 UTC
Dark Reading
Dark Reading
Stop Saying 'Digital Pearl Harbor'

Yes, there are serious dangers posed by malevolent nation-states. But the hype is distracting us from the reality of the threats.

2018-10-02 16:15:00 UTC
HackRead
HackRead
Meet GhostDNS: The dangerous malware behind IoT botnet targeting banks

By Waqas

Security researchers at NetLab, a sub-division of the Chinese cybersecurity firm Qihoo 360, have discovered a new, wide-scale, and very active malware campaign that has managed to hijack more than 100,000 home routers between Sept 21 and 27. A majority of routers (almost 88%) are located in Brazil. The malware has been dubbed GhostDNS. Once […]

This is a post from HackRead.com Read the original post: Meet GhostDNS: The dangerous malware behind IoT botnet targeting banks

Malware Security Botnet DNS GhostDNS Hacking IoT Security
2018-10-02 14:57:00 UTC
The Daily Swig
The Daily Swig
US Department of Energy invests $28m in cybersecurity

Eleven new projects will help protect the country’s critical infrastructure.

2018-10-02 14:49:00 UTC
ThreatPost
ThreatPost
Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration

The free online office suite software is used by more than 30 million people and is a ripe target for criminals.

Cloud Security Malware Privacy Data Exfiltration Email Keylogger Malware Analysis Platform Abuse Zoho
2018-10-02 14:01:00 UTC
ThreatPost
ThreatPost
Google Cracks Down on Malicious Chrome Extensions in Major Update

Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.

Privacy Web Security Chrome Web Store Extension Google Google Chrome Google Privacy Malicious Extension
2018-10-02 13:47:00 UTC
ThreatPost
ThreatPost
ThreatList: Password Hygiene Remains Lackluster in Global Businesses

Password-sharing persists, but at least multifactor authentication usage is up.

Hacks Most Recent ThreatLists Privacy Web Security Global Businesses LastPass Mfa Multifactor Authentication Password Hygiene Password Sharing Security Score The Report Threatlist
2018-10-01 22:00:00 UTC
Dark Reading
Dark Reading
'Short, Brutal Lives': Life Expectancy for Malicious Domains

Using a cooling-off period for domain names can help catch those registered by known bad actors.

2018-10-01 21:22:00 UTC
ThreatPost
ThreatPost
Adobe Patches 47 Critical Flaws in Acrobat and DC

The update includes a security bypass bug that enables privilege escalation.

Vulnerabilities Web Security Acrobat Dc And Reader Adobe Adobe Acrobat Adobe Flaw Adobe Update

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES