Skip to content

February 12, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

UK SMBs Failing to Manage Ex-Employee Risk

August 14, 2014Comments Off on UK SMBs Failing to Manage Ex-Employee Risk

Staff frequently take passwords with them and store business files in personal cloud services, says Intermedia.

Read More >>

Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

August 13, 2014Comments Off on Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

Attackers can use a file-sharing feature to access confidential info or serve targeted malware.

Read More >>

Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

August 13, 2014Comments Off on Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

Attackers can use a file-sharing feature to access confidential info or serve targeted malware.

Read More >>

Malware No Longer Avoids Virtual Machines

August 13, 2014Comments Off on Malware No Longer Avoids Virtual Machines

Most enterprises are implementing virtualization, so malware authors are learning to write their code to attack that infrastructure more effectively.

Read More >>

Android RAT Krysanec Masquerades as Legit Apps

August 13, 2014Comments Off on Android RAT Krysanec Masquerades as Legit Apps

Undetected, the bug sets up a backdoor to siphon off all kinds of personal information.

Read More >>

LastPass Users Left in the Lurch After Massive Outage

August 13, 2014Comments Off on LastPass Users Left in the Lurch After Massive Outage

Datacenter downer as firms are left unable to access key online accounts

Read More >>

Chinese Heart App Virus Slams 100,000 Android Phones

August 13, 2014Comments Off on Chinese Heart App Virus Slams 100,000 Android Phones

Malware written by software student spreads like wildfire in the Middle Kingdom.

Read More >>

2014 So Far: The Year of the Data Breach

August 12, 2014Comments Off on 2014 So Far: The Year of the Data Breach

Attacks are intensifying, and have already claimed 10 million personal records.

Read More >>

SecureAuth Adds Risk-based Authentication Scheme

August 12, 2014Comments Off on SecureAuth Adds Risk-based Authentication Scheme

Latest stab at “post-password” security adds live threat intelligence to the mix.

Read More >>

Xiaomi Issues Update After Data Privacy Concerns

August 12, 2014Comments Off on Xiaomi Issues Update After Data Privacy Concerns

MIUI Cloud Messaging made opt-in after negative feedback.

Read More >>
1 … 95,729 95,730 95,731 95,732 95,733 … 96,149

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Multiple Endpoint Manager bugs patched by Ivanti, including remote auth bypass February 12, 2026
  • What is Latam-GPT: Latin America’s Spanish and Portuguese AI model? February 12, 2026
  • Latest news bulletin | February 12th, 2026 – Morning February 12, 2026
  • Mustafa Suleyman says Microsoft is pursuing “true self-sufficiency” in AI by building enterprise- and healthcare-focused models and reducing reliance on OpenAI (Melissa Heikkilä/Financial Times) February 12, 2026
  • MoD promises faster recruitment with job offers in 10 days February 12, 2026
  • The US DOJ says Peter Williams, former boss of L3Harris’ Trenchant, stole and sold tools that can hack millions of computers worldwide to a Russian broker (Lorenzo Franceschi-Bicchierai/TechCrunch) February 12, 2026
  • Rutte urges rapid air defence build-up across NATO February 12, 2026

Categories Cloud

africa (4079) Americas (42270) AM Update (4747) Army (4344) Australia news (9687) Business (12752) China (5806) Culture (4041) Cyber Security (4532) cybersecurity (3863) Cyber Security News (4945) Donald Trump (5817) Environment (5207) Europe (18752) Foreign Policy (4693) france (4687) Hacking (8006) Health (3934) India (11886) Israel (5460) Mary Patriot News (4801) Media Wire (5804) middle east (6425) Nation (11477) Nation, Nation & World (6295) Nation, World (11511) News (41038) politics (8861) russia (7295) Security (7187) Show Types (4472) Society (3777) Sports (8436) Tankers (4967) Technology (4238) Trump administration (3890) UK news (20639) ukraine (6284) Uncategorized (3838) US Crime News (6899) US news (15774) US politics (23992) World (89394) World news (26930) worldNews (32192)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Multiple Endpoint Manager bugs patched by Ivanti, including remote auth bypass February 12, 2026
  • What is Latam-GPT: Latin America’s Spanish and Portuguese AI model? February 12, 2026
  • Latest news bulletin | February 12th, 2026 – Morning February 12, 2026
  • Mustafa Suleyman says Microsoft is pursuing “true self-sufficiency” in AI by building enterprise- and healthcare-focused models and reducing reliance on OpenAI (Melissa Heikkilä/Financial Times) February 12, 2026
  • MoD promises faster recruitment with job offers in 10 days February 12, 2026
  • The US DOJ says Peter Williams, former boss of L3Harris’ Trenchant, stole and sold tools that can hack millions of computers worldwide to a Russian broker (Lorenzo Franceschi-Bicchierai/TechCrunch) February 12, 2026
  • Rutte urges rapid air defence build-up across NATO February 12, 2026

Categories Cloud

africa (4079) Americas (42270) AM Update (4747) Army (4344) Australia news (9687) Business (12752) China (5806) Culture (4041) Cyber Security (4532) cybersecurity (3863) Cyber Security News (4945) Donald Trump (5817) Environment (5207) Europe (18752) Foreign Policy (4693) france (4687) Hacking (8006) Health (3934) India (11886) Israel (5460) Mary Patriot News (4801) Media Wire (5804) middle east (6425) Nation (11477) Nation, Nation & World (6295) Nation, World (11511) News (41038) politics (8861) russia (7295) Security (7187) Show Types (4472) Society (3777) Sports (8436) Tankers (4967) Technology (4238) Trump administration (3890) UK news (20639) ukraine (6284) Uncategorized (3838) US Crime News (6899) US news (15774) US politics (23992) World (89394) World news (26930) worldNews (32192)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive