Skip to content

February 11, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Kyle and Stan Malvertising Network Now Nine Times Larger

September 23, 2014Comments Off on Kyle and Stan Malvertising Network Now Nine Times Larger

Cisco researchers claim network is far more extensive than first thought.

Read More >>

FBI’s Quest to Pierce Tor Could Open the Door to Foreign Surveillance

September 22, 2014Comments Off on FBI’s Quest to Pierce Tor Could Open the Door to Foreign Surveillance

The Feds want to amend a rule that would allow remote search and seizure of data–with wide-ranging implications for unilateral action overseas.

Read More >>

Bottom Line Woes: Financial Sector Struggles with Federal Security Regulations

September 22, 2014Comments Off on Bottom Line Woes: Financial Sector Struggles with Federal Security Regulations

Federal regulations aimed at keeping financial firms safer are hitting companies’ bottom lines hard—but no one’s really complaining.

Read More >>

ISF Maps NIST’s Cybersecurity Framework

September 22, 2014Comments Off on ISF Maps NIST’s Cybersecurity Framework

The ISF has released the latest version of the Standard of Good Practice, incorporating the framework’s language.

Read More >>

Former Home Depot IT Staff Slam Firm’s Infosecurity Stance

September 22, 2014Comments Off on Former Home Depot IT Staff Slam Firm’s Infosecurity Stance

DIY chain didn’t pay enough heed to data security, say ex-staffers

Read More >>

Celebs Exposed Again as Hacked Photos Emerge Online

September 22, 2014Comments Off on Celebs Exposed Again as Hacked Photos Emerge Online

Round two spells more embarrassment for female celebrities

Read More >>

Google’s DoubleClick hijacked to spread malicious ads

September 22, 2014Comments Off on Google’s DoubleClick hijacked to spread malicious ads

Malvertisers infect unsuspecting netizens who are running out-of-date software

Read More >>

End of an Icon: Microsoft Axes Trustworthy Computing

September 19, 2014Comments Off on End of an Icon: Microsoft Axes Trustworthy Computing

After 12 years of leading the discussion on trustworthy computing, the group will become a casualty of the post-PC era.

Read More >>

White Hat Rally sets off for Amsterdam for Barnardo’s

September 19, 2014Comments Off on White Hat Rally sets off for Amsterdam for Barnardo’s

Participants in this year’s White Hat Rally set off from Folkestone in the early hours of this morning to begin their adventure into the unknown.

Read More >>

NATO Steps Up Private Sector Co-operation with New Alliance

September 19, 2014Comments Off on NATO Steps Up Private Sector Co-operation with New Alliance

NATO Industry Cyber Partnership will boost best practice sharing

Read More >>
1 … 95,598 95,599 95,600 95,601 95,602 … 96,028

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD February 11, 2026
  • Fortinet Patches High-Severity Vulnerabilities February 11, 2026
  • Kenya’s Mau Mau History February 11, 2026
  • A look at the Defence news 1 – 8 February February 11, 2026
  • In Ukraine’s west, Hungarian minority rights collide with wartime politics February 11, 2026
  • Fednav returns to newbuilding market after five-year pause February 11, 2026
  • Ivanti Endpoint Manager Flaw Enables Remote Data Exposure February 11, 2026

Categories Cloud

africa (4075) Americas (42207) AM Update (4742) Army (4340) Australia news (9677) Business (12731) China (5801) Culture (4035) Cyber Security (4527) cybersecurity (3860) Cyber Security News (4939) Donald Trump (5804) Environment (5206) Europe (18722) Foreign Policy (4688) france (4677) Hacking (8002) Health (3926) India (11871) Israel (5454) Mary Patriot News (4801) Media Wire (5804) middle east (6419) Nation (11467) Nation, Nation & World (6284) Nation, World (11492) News (40992) politics (8849) russia (7291) Security (7180) Show Types (4462) Society (3770) Sports (8436) Tankers (4957) Technology (4228) Trump administration (3878) UK news (20603) ukraine (6282) Uncategorized (3834) US Crime News (6895) US news (15731) US politics (23951) World (89262) World news (26899) worldNews (32153)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD February 11, 2026
  • Fortinet Patches High-Severity Vulnerabilities February 11, 2026
  • Kenya’s Mau Mau History February 11, 2026
  • A look at the Defence news 1 – 8 February February 11, 2026
  • In Ukraine’s west, Hungarian minority rights collide with wartime politics February 11, 2026
  • Fednav returns to newbuilding market after five-year pause February 11, 2026
  • Ivanti Endpoint Manager Flaw Enables Remote Data Exposure February 11, 2026

Categories Cloud

africa (4075) Americas (42207) AM Update (4742) Army (4340) Australia news (9677) Business (12731) China (5801) Culture (4035) Cyber Security (4527) cybersecurity (3860) Cyber Security News (4939) Donald Trump (5804) Environment (5206) Europe (18722) Foreign Policy (4688) france (4677) Hacking (8002) Health (3926) India (11871) Israel (5454) Mary Patriot News (4801) Media Wire (5804) middle east (6419) Nation (11467) Nation, Nation & World (6284) Nation, World (11492) News (40992) politics (8849) russia (7291) Security (7180) Show Types (4462) Society (3770) Sports (8436) Tankers (4957) Technology (4228) Trump administration (3878) UK news (20603) ukraine (6282) Uncategorized (3834) US Crime News (6895) US news (15731) US politics (23951) World (89262) World news (26899) worldNews (32153)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive