Skip to content

February 26, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

XSSposed Aims to Call Out Compromised Websites

August 8, 2014Comments Off on XSSposed Aims to Call Out Compromised Websites

The public archive of compromised websites is meant to motivate companies to patch simple vulnerabilities.

Read More >>

Sophisticated Spy Campaign Targets Former Eastern Bloc Countries

August 8, 2014Comments Off on Sophisticated Spy Campaign Targets Former Eastern Bloc Countries

Espionage malware has persisted in embassies and state offices for at least four years.

Read More >>

BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

August 8, 2014Comments Off on BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

Hackers can take over mobile point of sale devices through various means, including inserting a maliciously crafted card.

Read More >>

BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

August 8, 2014Comments Off on BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

While it’s true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.

Read More >>

BlackHat 2014: Square Launches Bug Bounty Program

August 8, 2014Comments Off on BlackHat 2014: Square Launches Bug Bounty Program

The program has paid $250-$1,500 per bug for uncovering card payment issues.

Read More >>

Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

August 8, 2014Comments Off on Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

Web giant will use the secure protocol as a ‘signal’ in search ranking algorithm

Read More >>

FBI Used Drive-By-Downloads to Expose Tor Pedophiles

August 8, 2014Comments Off on FBI Used Drive-By-Downloads to Expose Tor Pedophiles

Controversial Operation Torpedo has come to light through released court documents.

Read More >>

BlackHat 2014: Airport Scanners Riddled with Security Flaws

August 8, 2014Comments Off on BlackHat 2014: Airport Scanners Riddled with Security Flaws

The scanners used by many airports in the United States are riddled with security flaws, a security researcher told attendees at the Black Hat conference in Las Vegas Wednesday.

Read More >>

WordPress Vulnerability Affects A Quarter of the Internet

August 7, 2014Comments Off on WordPress Vulnerability Affects A Quarter of the Internet

The wide-net bug paves the way for massive DDoS attacks that can’t be mitigated by normal security measures.

Read More >>

John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

August 7, 2014Comments Off on John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

AV founder calls on users to take a stand against apps which are chipping away at personal freedoms.

Read More >>
1 … 97,355 97,356 97,357 97,358 97,359 … 97,774

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Hottest cybersecurity open-source tools of the month: February 2026 February 26, 2026
  • A Deal or War? Crucial Talks to Begin Between U.S. and Iran February 26, 2026
  • US government accused of major ‘cover-up’ over Trump sex abuse claims February 26, 2026
  • Jeff Galloway, who inspired people with his run-walk method, dies at 80 February 26, 2026
  • Australian PM apologises after calling child sex abuse survivor and advocate ‘difficult’ February 26, 2026
  • North Korea’s Kim Jong Un warns South Korea, says US should end hostility February 26, 2026
  • A Cloudflare engineer rebuilt Next.js from scratch in one week using AI, reimplementing 94% of its API and spending $1,100 on Claude tokens (Tim Anderson/The Register) February 26, 2026

Categories Cloud

africa (4144) Americas (43041) AM Update (4799) Army (4398) Australia news (9835) Business (12997) China (5893) Culture (4130) cybersecurity (3929) Cyber Security (4609) Cyber Security News (5021) Donald Trump (5955) Environment (5287) Europe (19132) Foreign Policy (4766) france (4869) Hacking (8080) Health (4004) India (12261) Israel (5534) Mary Patriot News (4801) Media Wire (5804) middle east (6506) Nation (11690) Nation, Nation & World (6413) Nation, World (11722) News (41720) politics (9013) russia (7391) Security (7319) Show Types (4656) Society (3849) Sports (8484) Tankers (5097) Technology (4342) Trump administration (4026) UK news (21045) ukraine (6356) Uncategorized (3860) US Crime News (7011) US news (16186) US politics (24466) World (91161) World news (27280) worldNews (32856)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Hottest cybersecurity open-source tools of the month: February 2026 February 26, 2026
  • A Deal or War? Crucial Talks to Begin Between U.S. and Iran February 26, 2026
  • US government accused of major ‘cover-up’ over Trump sex abuse claims February 26, 2026
  • Jeff Galloway, who inspired people with his run-walk method, dies at 80 February 26, 2026
  • Australian PM apologises after calling child sex abuse survivor and advocate ‘difficult’ February 26, 2026
  • North Korea’s Kim Jong Un warns South Korea, says US should end hostility February 26, 2026
  • A Cloudflare engineer rebuilt Next.js from scratch in one week using AI, reimplementing 94% of its API and spending $1,100 on Claude tokens (Tim Anderson/The Register) February 26, 2026

Categories Cloud

africa (4144) Americas (43041) AM Update (4799) Army (4398) Australia news (9835) Business (12997) China (5893) Culture (4130) cybersecurity (3929) Cyber Security (4609) Cyber Security News (5021) Donald Trump (5955) Environment (5287) Europe (19132) Foreign Policy (4766) france (4869) Hacking (8080) Health (4004) India (12261) Israel (5534) Mary Patriot News (4801) Media Wire (5804) middle east (6506) Nation (11690) Nation, Nation & World (6413) Nation, World (11722) News (41720) politics (9013) russia (7391) Security (7319) Show Types (4656) Society (3849) Sports (8484) Tankers (5097) Technology (4342) Trump administration (4026) UK news (21045) ukraine (6356) Uncategorized (3860) US Crime News (7011) US news (16186) US politics (24466) World (91161) World news (27280) worldNews (32856)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive