Skip to content

April 2, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Destructive BlackEnergy Attacks Blitz Ukrainian News and Energy Firms

January 4, 2016Comments Off on Destructive BlackEnergy Attacks Blitz Ukrainian News and Energy Firms

Hacking team had a busy 2015, according to Eset

Read More >>

APAC Industrial Control Security Market to Top $1 Billion

December 23, 2015Comments Off on APAC Industrial Control Security Market to Top $1 Billion

New report claims firms are beginning to understand the threat to ICS

Read More >>

Center for Internet Security Releases Companion Guides

December 23, 2015Comments Off on Center for Internet Security Releases Companion Guides

The CIS Controls are a recommended set of actions to stop today’s most pervasive and dangerous cybersecurity attacks.

Read More >>

IoT, Virtual Architecture to Dominate Cloud Security in 2016

December 22, 2015Comments Off on IoT, Virtual Architecture to Dominate Cloud Security in 2016

The cloud represents several emerging attack vectors that IT departments and everyday users should be considering now.

Read More >>

Panda Security: New Malware Hit 230,000 Per Day in 2015

December 22, 2015Comments Off on Panda Security: New Malware Hit 230,000 Per Day in 2015

Vendor predicts JavaScript and PowerShell attacks could be on the rise

Read More >>

Foreign Hackers Infiltrate US Power Grid – Report

December 22, 2015Comments Off on Foreign Hackers Infiltrate US Power Grid – Report

Iranian attackers stole top secret plans

Read More >>

US Congress Passes Controversial Info-Sharing Bill

December 21, 2015Comments Off on US Congress Passes Controversial Info-Sharing Bill

After more than five years of debate. The Cybersecurity Act of 2015 was passed as part of the Omnibus Spending Bill.

Read More >>

Cyber-Bonanza: 80% of Android Users Have Outdated Smartphones

December 21, 2015Comments Off on Cyber-Bonanza: 80% of Android Users Have Outdated Smartphones

With 6,400 new instances of malware targeting Android devices every day in the third quarter, phones that aren’t updated offer a big attack vector.

Read More >>

Hello Kitty, Goodbye Privacy as 3M+ Users Hit by Breach

December 21, 2015Comments Off on Hello Kitty, Goodbye Privacy as 3M+ Users Hit by Breach

Another MongoDB issue leads to exposure of personal data online

Read More >>

Facebook Shuns Buggy Flash in Favor of HTML5

December 21, 2015Comments Off on Facebook Shuns Buggy Flash in Favor of HTML5

Changes shipped to all browsers by default

Read More >>
1 … 101,288 101,289 101,290 101,291 101,292 … 101,824

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Beyond the Certificate: Why Real Expertise in Investigative Interviewing Comes from Practice April 2, 2026
  • Declining global security April 2, 2026
  • Watch live: Nasa’s first crewed Moon mission in half a century April 2, 2026
  • ‘George HW Bush’ In Middle East? US Sends 3rd Carrier Amid ‘Stone Age’ Threat April 2, 2026
  • Major 7.4 mag earthquake strikes off Indonesia killing one and triggering tsunami warning April 2, 2026
  • Blood and Tesla Logos: Early Morning Crash Evidence April 2, 2026
  • A profile of Microsoft CFO Amy Hood, who paused some data center expansion last year, a decision some say led to its current supply crunch and growth bottleneck (Bloomberg) April 2, 2026

Categories Cloud

africa (4308) Americas (44940) AM Update (4922) Army (4556) Australia news (10220) Business (13540) China (6099) Culture (4324) Cyber Security (4857) cybersecurity (4133) Cyber Security News (5255) Donald Trump (6427) Environment (5460) Europe (19808) Foreign Policy (4928) france (5115) Hacking (8273) Health (4183) India (13030) Israel (6379) Mary Patriot News (4801) Media Wire (5804) middle east (7113) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43343) politics (9428) russia (7598) Security (7725) Show Types (5442) Society (4047) Sports (8559) Tankers (5512) Technology (4566) Trump administration (4402) UK news (22044) ukraine (6474) Uncategorized (3905) US Crime News (7253) US news (17219) US politics (25734) World (95847) World news (28205) worldNews (34484)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Beyond the Certificate: Why Real Expertise in Investigative Interviewing Comes from Practice April 2, 2026
  • Declining global security April 2, 2026
  • Watch live: Nasa’s first crewed Moon mission in half a century April 2, 2026
  • ‘George HW Bush’ In Middle East? US Sends 3rd Carrier Amid ‘Stone Age’ Threat April 2, 2026
  • Major 7.4 mag earthquake strikes off Indonesia killing one and triggering tsunami warning April 2, 2026
  • Blood and Tesla Logos: Early Morning Crash Evidence April 2, 2026
  • A profile of Microsoft CFO Amy Hood, who paused some data center expansion last year, a decision some say led to its current supply crunch and growth bottleneck (Bloomberg) April 2, 2026

Categories Cloud

africa (4308) Americas (44940) AM Update (4922) Army (4556) Australia news (10220) Business (13540) China (6099) Culture (4324) Cyber Security (4857) cybersecurity (4133) Cyber Security News (5255) Donald Trump (6427) Environment (5460) Europe (19808) Foreign Policy (4928) france (5115) Hacking (8273) Health (4183) India (13030) Israel (6379) Mary Patriot News (4801) Media Wire (5804) middle east (7113) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43343) politics (9428) russia (7598) Security (7725) Show Types (5442) Society (4047) Sports (8559) Tankers (5512) Technology (4566) Trump administration (4402) UK news (22044) ukraine (6474) Uncategorized (3905) US Crime News (7253) US news (17219) US politics (25734) World (95847) World news (28205) worldNews (34484)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive