Skip to content

April 27, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Mahdi malware campaign resurrected

After having its command-and-control server shut down, the Madhi (Messiah) malware is back with improved features, warns Kaspersky Lab.

July 26, 2012
0 comment
Read More >>

NIST: You can’t tell software misuse without a scorecard

The US National Institute of Standards and Technology (NIST) has issued a scoring system for computer security managers to assess the severity of security risks caused by software misuse.

July 26, 2012
0 comment
Read More >>

BlackHat 2012: Microsoft Incorporates BlueHat ROP Mitigation Technology into EMET

One of the three finalist entries for Microsoft’s first-ever BlueHat Prize for building new security defense technologies is now part of the software giant’s free Enhanced Mitigation Experience Toolkit (EMET).

July 26, 2012
0 comment
Read More >>

Software-related medical device recalls raise security, privacy concerns

Close to 15% of medical device recalls by the US Food and Drug Administration (FDA) between January 2009 and May 2011 involved software problems, which could pose privacy risks to patient data, according to a study funded by the US Department of Health…

July 25, 2012
0 comment
Read More >>

Siemens patches security flaws in SCADA systems

Siemens has patched a number of security holes in its SIMATIC supervisory control and data acquisition (SCADA) systems, according to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).

July 25, 2012
0 comment
Read More >>

EU reaches agreement with Google over competition issues

European Union (EU) regulators have a reached an “understanding” with Google over concerns about anti-competitive behavior on the part of the search engine giant.

July 25, 2012
0 comment
Read More >>

Black Hat 2012: ModSecurity open-source firewall now supports Apache, IIS and Nginx

The free open-source web application firewall known as ModSecurity – once just an Apache plug-in – now also plugs directly into IIS and Nginx web servers, and is particularly good for virtual patching.

July 25, 2012
0 comment
Read More >>

Financial malware uses Facebook for new children’s charity scam

Earlier in May it was found that Citadel was delivering the Reveton ransomware. Now Trusteer has discovered it delivering a children’s charity scam to Facebook users.

July 25, 2012
0 comment
Read More >>

New Mac trojan discovered: OSX Crisis (or Morcut)

Mac security firm Intego was the first to sound the alarm yesterday, calling the newly discovered trojan Backdoor:OSX/Crisis. Today Sophos issues its own warning about OSX/Morcut.A – which seems to be the same malware.

July 25, 2012
0 comment
Read More >>

FTC warns unauthorized wireless charges becoming a significant problem

The US Federal Trade Commission (FTC) is warning that unauthorized charges on wireless phone bills, known as “cramming”, are becoming an increasingly serious problem for US consumers.

July 24, 2012
0 comment
Read More >>
1 … 38,707 38,708 38,709 38,710 38,711 … 38,980

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Firefox Vulnerability Allows Tor User Fingerprinting April 27, 2026
  • Aptori expands its platform with autonomous offensive testing to reduce security bottlenecks April 27, 2026
  • Ukrainians mark 40th anniversary of Chernobyl disaster April 27, 2026
  • Iran offers deal to break deadlock with US – Axios April 27, 2026
  • White House Correspondents’ Dinner suspect to be charged as Trump prepares to welcome king – US politics live April 27, 2026
  • Mali defence minister Sadio Camara killed as Al-Qaeda linked insurgents launch coordinated attacks April 27, 2026
  • Odesa bears brunt of latest Russian attacks on Ukraine – Europe live April 27, 2026

Categories Cloud

africa (4475) Americas (46178) AM Update (5027) Army (4665) Australia news (10449) Business (13863) China (6240) Culture (4449) cybersecurity (4263) Cyber Security (5023) Cyber Security News (5421) Donald Trump (6755) Environment (5595) Europe (20318) Foreign Policy (5046) france (5264) Hacking (8412) Health (4305) India (13579) Israel (6796) Mary Patriot News (4801) Media Wire (5804) middle east (7384) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44483) politics (9700) russia (7742) Security (7988) Show Types (5860) Society (4175) sport (4153) Sports (8613) Tankers (5773) Technology (4716) Trump administration (4631) UK news (22721) ukraine (6560) US Crime News (7412) US news (17956) US politics (26570) World (98891) World news (28820) worldNews (35667)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Firefox Vulnerability Allows Tor User Fingerprinting April 27, 2026
  • Aptori expands its platform with autonomous offensive testing to reduce security bottlenecks April 27, 2026
  • Ukrainians mark 40th anniversary of Chernobyl disaster April 27, 2026
  • Iran offers deal to break deadlock with US – Axios April 27, 2026
  • White House Correspondents’ Dinner suspect to be charged as Trump prepares to welcome king – US politics live April 27, 2026
  • Mali defence minister Sadio Camara killed as Al-Qaeda linked insurgents launch coordinated attacks April 27, 2026
  • Odesa bears brunt of latest Russian attacks on Ukraine – Europe live April 27, 2026

Categories Cloud

africa (4475) Americas (46178) AM Update (5027) Army (4665) Australia news (10449) Business (13863) China (6240) Culture (4449) cybersecurity (4263) Cyber Security (5023) Cyber Security News (5421) Donald Trump (6755) Environment (5595) Europe (20318) Foreign Policy (5046) france (5264) Hacking (8412) Health (4305) India (13579) Israel (6796) Mary Patriot News (4801) Media Wire (5804) middle east (7384) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44483) politics (9700) russia (7742) Security (7988) Show Types (5860) Society (4175) sport (4153) Sports (8613) Tankers (5773) Technology (4716) Trump administration (4631) UK news (22721) ukraine (6560) US Crime News (7412) US news (17956) US politics (26570) World (98891) World news (28820) worldNews (35667)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive