Skip to content

February 11, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Critroni/Onion Is Most Sophisticated Ransomware Yet

July 25, 2014Comments Off on Critroni/Onion Is Most Sophisticated Ransomware Yet

The malware uses the Tor anonymity network to attack its victims.

Read More >>

One in Three Ex-employees Can Access Corporate Networks

July 24, 2014Comments Off on One in Three Ex-employees Can Access Corporate Networks

Research shows that insider threats continue long after job termination.

Read More >>

UK Netizens Unmoved by ISP-level Porn Filters

July 24, 2014Comments Off on UK Netizens Unmoved by ISP-level Porn Filters

Ofcom report shows only small percentage of users switched on parental controls.

Read More >>

StubHub Breach Part of a Coordinated, International Cybercriminal Ring

July 23, 2014Comments Off on StubHub Breach Part of a Coordinated, International Cybercriminal Ring

Law enforcement agencies in several countries have carried out a joint disruption of the alleged perpetrators.

Read More >>

Internet Explorer Vulnerabilities Double in 2014

July 23, 2014Comments Off on Internet Explorer Vulnerabilities Double in 2014

Criminals, as ever, adapt to go after low-hanging fruit.

Read More >>

ISACA Revamps COBIT 5 Core Principles

July 23, 2014Comments Off on ISACA Revamps COBIT 5 Core Principles

Five new core tenants will underpin the framework.

Read More >>

Nigeria’s 419 Scammers Trade Up to Info-Stealing Trojan Attacks

July 23, 2014Comments Off on Nigeria’s 419 Scammers Trade Up to Info-Stealing Trojan Attacks

Palo Alto Networks warns of new risk to businesses from relative malware ‘novices’.

Read More >>

Snowden to Hackers of the World: Build NSA-proof Systems

July 22, 2014Comments Off on Snowden to Hackers of the World: Build NSA-proof Systems

Technologists also have a ‘civic duty’ to teach those around them how to use tech safely, whistleblower Edward Snowden says.

Read More >>

Kali Linux 1.0.8 Release with EFI Boot Support

July 22, 2014July 5, 2025Comments Off on Kali Linux 1.0.8 Release with EFI Boot Support

The long awaited Kali Linux USB EFI boot support feature has been added to our binary ISO builds, which has prompted this early Kali Linux 1.0.8 release. This new feature simplifies getting Kali installed and running on more recent hardware which requi…

Read More >>

Nasdaq Hackers Used Two Zero Days But Motives a Mystery

July 21, 2014Comments Off on Nasdaq Hackers Used Two Zero Days But Motives a Mystery

US intelligence pointed finger at Moscow but questions remain three years on.

Read More >>
1 … 95,639 95,640 95,641 95,642 95,643 … 96,054

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Is Europe’s just-tested hypersonic missile the answer to Russia’s Oreshnik? February 11, 2026
  • Zast.AI Raises $6 Million for AI-Powered Code Security February 11, 2026
  • What are Canada’s gun ownership laws? February 11, 2026
  • xAI all-hands meeting: Elon Musk tells staff that xAI needs a factory on the moon to build AI satellites and a massive catapult to launch them into space (New York Times) February 11, 2026
  • US closes airspace over Texas border town for 10 days for ‘special security reasons’ February 11, 2026
  • Six men named in US Congress: Why is so much redacted in the Epstein files? February 11, 2026
  • Security in the Dark: Recognizing the Signs of Hidden Information February 11, 2026

Categories Cloud

africa (4076) Americas (42214) AM Update (4747) Army (4340) Australia news (9678) Business (12741) China (5802) Culture (4036) Cyber Security (4530) cybersecurity (3861) Cyber Security News (4943) Donald Trump (5807) Environment (5207) Europe (18735) Foreign Policy (4688) france (4678) Hacking (8004) Health (3928) India (11871) Israel (5455) Mary Patriot News (4801) Media Wire (5804) middle east (6420) Nation (11467) Nation, Nation & World (6284) Nation, World (11493) News (41004) politics (8851) russia (7292) Security (7181) Show Types (4466) Society (3772) Sports (8436) Tankers (4959) Technology (4231) Trump administration (3881) UK news (20611) ukraine (6282) Uncategorized (3835) US Crime News (6896) US news (15738) US politics (23956) World (89290) World news (26908) worldNews (32161)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Is Europe’s just-tested hypersonic missile the answer to Russia’s Oreshnik? February 11, 2026
  • Zast.AI Raises $6 Million for AI-Powered Code Security February 11, 2026
  • What are Canada’s gun ownership laws? February 11, 2026
  • xAI all-hands meeting: Elon Musk tells staff that xAI needs a factory on the moon to build AI satellites and a massive catapult to launch them into space (New York Times) February 11, 2026
  • US closes airspace over Texas border town for 10 days for ‘special security reasons’ February 11, 2026
  • Six men named in US Congress: Why is so much redacted in the Epstein files? February 11, 2026
  • Security in the Dark: Recognizing the Signs of Hidden Information February 11, 2026

Categories Cloud

africa (4076) Americas (42214) AM Update (4747) Army (4340) Australia news (9678) Business (12741) China (5802) Culture (4036) Cyber Security (4530) cybersecurity (3861) Cyber Security News (4943) Donald Trump (5807) Environment (5207) Europe (18735) Foreign Policy (4688) france (4678) Hacking (8004) Health (3928) India (11871) Israel (5455) Mary Patriot News (4801) Media Wire (5804) middle east (6420) Nation (11467) Nation, Nation & World (6284) Nation, World (11493) News (41004) politics (8851) russia (7292) Security (7181) Show Types (4466) Society (3772) Sports (8436) Tankers (4959) Technology (4231) Trump administration (3881) UK news (20611) ukraine (6282) Uncategorized (3835) US Crime News (6896) US news (15738) US politics (23956) World (89290) World news (26908) worldNews (32161)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive