Skip to content

February 11, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Malicious Insider Threat Flagged Thanks to Windows Update Flaw

August 7, 2015Comments Off on Malicious Insider Threat Flagged Thanks to Windows Update Flaw

Context researchers claim config error is to blame

Read More >>

#BlackHat: Flash Zero-Day Weaponized in Record Time

August 6, 2015Comments Off on #BlackHat: Flash Zero-Day Weaponized in Record Time

Exploit kits integrated Hacking Team zero-days into their digital weapons in half the usual time.

Read More >>

#BlackHat: Smartwatches Present Varying Security Risks

August 5, 2015Comments Off on #BlackHat: Smartwatches Present Varying Security Risks

Various brands of smartwatches present differing risks for data loss.

Read More >>

Accenture Acquires FusionX

August 4, 2015Comments Off on Accenture Acquires FusionX

The buy will help Accenture beef up its security consulting business.

Read More >>

Accenture Acquires FusionX

August 4, 2015Comments Off on Accenture Acquires FusionX

The buy will help Accenture beef up its security consulting business.

Read More >>

#BlackHat: China’s Terracotta VPN Used for Advanced Threat Anonymity

August 4, 2015Comments Off on #BlackHat: China’s Terracotta VPN Used for Advanced Threat Anonymity

Terracotta is being used as a launch platform for APT actors, including the well-known Shell_Crew/DeepPanda group.

Read More >>

Macs Face Zero-Day Exploit and Firmware Worm

August 4, 2015Comments Off on Macs Face Zero-Day Exploit and Firmware Worm

Thunderstrike 2 is a proof-of-concept firmware worm that’s the first to attack Macs.

Read More >>

39% of Companies Use Password-Only Authentication

August 3, 2015Comments Off on 39% of Companies Use Password-Only Authentication

62% view employees as their biggest threat.

Read More >>

FBI Skills Gaps Leave Field Offices Understaffed with Cyber Experts

August 3, 2015Comments Off on FBI Skills Gaps Leave Field Offices Understaffed with Cyber Experts

Next Generation Cyber Initiative has problems, says OGI

Read More >>

Fresh Attack Vectors Found for Stagefright Android Flaw

August 1, 2015Comments Off on Fresh Attack Vectors Found for Stagefright Android Flaw

In addition to MMS, devices can be infected using malicious video files that auto-play when opening a website, or via malicious apps or MP4 files.

Read More >>
1 … 95,511 95,512 95,513 95,514 95,515 … 96,012

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Cisco enhances security for enterprise AI adoption February 11, 2026
  • Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy February 11, 2026
  • Trellix SecondSight identifies subtle indicators of an active breach February 11, 2026
  • South Korea’s Science Ministry blames Coupang’s massive 2025 data leak on management failures and accuses it of defying a government order to preserve data logs (Reuters) February 11, 2026
  • US scores worst-ever result in corruption index as democracies backslide February 11, 2026
  • Kuwait extends two-day public holiday for 65th National Day, Liberation Day celebrations February 11, 2026
  • What really destroyed the Indus Valley? It wasn’t war, but a slow death by drought February 11, 2026

Categories Cloud

africa (4075) Americas (42203) AM Update (4742) Army (4339) Australia news (9672) Business (12730) China (5798) Culture (4035) Cyber Security (4523) cybersecurity (3859) Cyber Security News (4935) Donald Trump (5804) Environment (5205) Europe (18720) Foreign Policy (4685) france (4675) Hacking (8000) Health (3925) India (11854) Israel (5454) Mary Patriot News (4801) Media Wire (5804) middle east (6418) Nation (11467) Nation, Nation & World (6284) Nation, World (11489) News (40985) politics (8848) russia (7285) Security (7178) Show Types (4456) Society (3770) Sports (8435) Tankers (4955) Technology (4228) Trump administration (3878) UK news (20602) ukraine (6278) Uncategorized (3834) US Crime News (6895) US news (15731) US politics (23951) World (89252) World news (26895) worldNews (32152)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Cisco enhances security for enterprise AI adoption February 11, 2026
  • Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy February 11, 2026
  • Trellix SecondSight identifies subtle indicators of an active breach February 11, 2026
  • South Korea’s Science Ministry blames Coupang’s massive 2025 data leak on management failures and accuses it of defying a government order to preserve data logs (Reuters) February 11, 2026
  • US scores worst-ever result in corruption index as democracies backslide February 11, 2026
  • Kuwait extends two-day public holiday for 65th National Day, Liberation Day celebrations February 11, 2026
  • What really destroyed the Indus Valley? It wasn’t war, but a slow death by drought February 11, 2026

Categories Cloud

africa (4075) Americas (42203) AM Update (4742) Army (4339) Australia news (9672) Business (12730) China (5798) Culture (4035) Cyber Security (4523) cybersecurity (3859) Cyber Security News (4935) Donald Trump (5804) Environment (5205) Europe (18720) Foreign Policy (4685) france (4675) Hacking (8000) Health (3925) India (11854) Israel (5454) Mary Patriot News (4801) Media Wire (5804) middle east (6418) Nation (11467) Nation, Nation & World (6284) Nation, World (11489) News (40985) politics (8848) russia (7285) Security (7178) Show Types (4456) Society (3770) Sports (8435) Tankers (4955) Technology (4228) Trump administration (3878) UK news (20602) ukraine (6278) Uncategorized (3834) US Crime News (6895) US news (15731) US politics (23951) World (89252) World news (26895) worldNews (32152)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive