Skip to content

May 1, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

New, harder-to-detect Bugat malware used in LinkedIn attacks

IT security researchers have warned of the emergence of a new, better-hidden version of the Bugat financial malware used to commit online fraud.

October 12, 2010
0 comment
Read More >>

New, harder-to-detect Bugat malware used in LinkedIn attacks

IT security researchers have warned of the emergence of a new, better-hidden version of the Bugat financial malware used to commit online fraud.

October 12, 2010
0 comment
Read More >>

Stuxnet malware is a paradigm shift in the war to protect critical infrastructure

The Stuxnet malware that has attacked Iranian nuclear facilities and Chinese computers is a “paradigm shift” in the war to protect critical infrastructures around the global, warns the European Network and Information Security Agency (ENISA).

October 12, 2010
0 comment
Read More >>

British firms warned over laptop data lethargy

A survey just completed claims to show that around two-thirds (65%) of IT managers have no idea where their organisation’s mobile devices are, and that almost half of respondents are unable to manage PCs and Macs together.

October 12, 2010
0 comment
Read More >>

Spammers tap soft hyphens to beat email intercept security

It seems that spammers are starting to use the so-called ‘SHY’ character – aka a soft hyphen – to fool IT security applications into allowing email applications to allow click-throughs to suspect web pages.

October 11, 2010
0 comment
Read More >>

Monthly cyber attacks against Australian military networks more than tripled this year

The Australian military has seen cyber attacks against its networks jump from 200 per month last year to 700 attacks per month this year, according to the Australian Defence Signals Directorate.

October 11, 2010
0 comment
Read More >>

Information security is not just about gizmos and gadgets

Information security is not just about technical solutions, such as hardware and software. It is also about policies and process companies put in place to ensure technical solutions fit in with the broader corporate information security strategy. To pr…

October 11, 2010
0 comment
Read More >>

Fannie Mae contractor faces jail term for planting malware

A former Unix engineer faces 10 years in jail for planting a malicious script designed to destroy data at troubled mortgage giant, Fannie Mae.

October 8, 2010
0 comment
Read More >>

FBI thwarts data breach at Akamai Technologies

A potential data breach at Akamai Technologies was foiled by the Federal Bureau of Investigation (FBI), prosecutors disclosed this week.

October 8, 2010
0 comment
Read More >>

Adobe shares surge on reports of possible Microsoft takeover

Adobe Systems shares surged 12% after the New York Times said Microsoft may work more closely with the company and possibly acquire it.

October 8, 2010
0 comment
Read More >>
1 … 39,081 39,082 39,083 39,084 39,085 … 39,195

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • Trump to remove Scottish whisky tariffs after King Charles’ US visit May 1, 2026
  • Opening Hormuz ‘not a humanitarian gesture’: Essential to keeping global food system operating May 1, 2026
  • Workers across the world march for peace and better pay in May Day rallies May 1, 2026
  • French unions rally on Labour Day to defend paid holiday rights May 1, 2026
  • Ruby Gems and Go Modules Used in Campaign Targeting GitHub Actions May 1, 2026
  • Conference League: Strasbourg on the brink after defeat against Rayo Vallecano May 1, 2026
  • Shadow AI risks deepen as 31% of users get no employer training May 1, 2026

Categories Cloud

africa (4507) Americas (46448) AM Update (5047) Army (4680) Australia news (10497) Business (13929) China (6264) Culture (4481) Cyber Security (5059) cybersecurity (4285) Cyber Security News (5456) Donald Trump (6812) Environment (5627) Europe (20431) Foreign Policy (5059) france (5289) Hacking (8435) Health (4330) India (13677) Israel (6835) Mary Patriot News (4801) Media Wire (5804) middle east (7420) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44697) politics (9749) russia (7783) Security (8036) Show Types (5936) Society (4198) sport (4209) Sports (8621) Tankers (5824) Technology (4755) Trump administration (4677) UK news (22852) ukraine (6572) US Crime News (7444) US news (18091) US politics (26737) World (99439) World news (28921) worldNews (35841)

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • Trump to remove Scottish whisky tariffs after King Charles’ US visit May 1, 2026
  • Opening Hormuz ‘not a humanitarian gesture’: Essential to keeping global food system operating May 1, 2026
  • Workers across the world march for peace and better pay in May Day rallies May 1, 2026
  • French unions rally on Labour Day to defend paid holiday rights May 1, 2026
  • Ruby Gems and Go Modules Used in Campaign Targeting GitHub Actions May 1, 2026
  • Conference League: Strasbourg on the brink after defeat against Rayo Vallecano May 1, 2026
  • Shadow AI risks deepen as 31% of users get no employer training May 1, 2026

Categories Cloud

africa (4507) Americas (46448) AM Update (5047) Army (4680) Australia news (10497) Business (13929) China (6264) Culture (4481) Cyber Security (5059) cybersecurity (4285) Cyber Security News (5456) Donald Trump (6812) Environment (5627) Europe (20431) Foreign Policy (5059) france (5289) Hacking (8435) Health (4330) India (13677) Israel (6835) Mary Patriot News (4801) Media Wire (5804) middle east (7420) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44697) politics (9749) russia (7783) Security (8036) Show Types (5936) Society (4198) sport (4209) Sports (8621) Tankers (5824) Technology (4755) Trump administration (4677) UK news (22852) ukraine (6572) US Crime News (7444) US news (18091) US politics (26737) World (99439) World news (28921) worldNews (35841)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive