Skip to content

November 1, 2025

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Digital Attack Map
    • Real-time web monitor AKAMAI
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Crypto

Elusive Comet Attack: Hackers Use Zoom Remote-Control to Steal Crypto

Hackers in the Elusive Comet campaign exploit Zoom’s remote-control feature to steal cryptocurrency, and over $100K lost in…

April 24, 2025
0 comment
Read More >>

Pre-Installed Malware on Cheap Android Phones Steals Crypto via Fake WhatsApp

Cheap Android phones with preinstalled malware use fake apps like WhatsApp to hijack crypto transactions and steal wallet recovery phrases.

April 14, 2025
0 comment
Read More >>

Why security culture is crypto’s strongest asset

In this Help Net Security interview, Norah Beers, CISO at Grayscale, discusses key security challenges in managing crypto assets, adversary tactics, private key management, and securing both hot and cold wallets. From a threat modeling perspective, wha…

April 11, 2025
0 comment
Read More >>

npm Malware Targets Atomic and Exodus Wallets to Hijack Crypto Transfers

ReversingLabs reveals a malicious npm package targeting Atomic and Exodus wallets, silently hijacking crypto transfers via software patching.

April 10, 2025
0 comment
Read More >>

Top Crypto Wallets of 2025: Balancing Security and Convenience

Crypto software wallets are invincible in the micro range. If you own multiple crypto assets, you need safe and reliable wallets, too.

April 4, 2025
0 comment
Read More >>

Top Crypto Wallets of 2025: Balancing Security and Convenience

Crypto software wallets are invincible in the micro range. If you own multiple crypto assets, you need safe and reliable wallets, too.

April 4, 2025
0 comment
Read More >>

StilachiRAT Exploits Chrome for Crypto Wallets and Credentials

StilachiRAT: Sophisticated malware targets crypto wallets & credentials. Undetected, it maps systems & steals data. Microsoft advises strong security measures.

March 17, 2025
0 comment
Read More >>

Cybersecurity in Crypto: Best Practices to Prevent Theft and Fraud

Cybersecurity tips to protect your cryptocurrency from hackers, scams, and fraud. Learn best practices for securing digital assets…

March 15, 2025
0 comment
Read More >>

Long Arm of the Law Comes for Russian Crypto: Why Secret Service Seized Garantex

Authorities say Garantex has processed more than $96 billion in transactions since it launched in 2019.

March 11, 2025
0 comment
Read More >>

Garantex Crypto Exchange Seized, Two Charged in Laundering Scheme

International law enforcement disrupts Garantex, a multi-billion-dollar cryptocurrency exchange used for money laundering. Two individuals, Aleksej Besciokov and…

March 11, 2025
0 comment
Read More >>
1 … 3 4 5 6 7 … 16

Archives

November 2025
M T W T F S S
 12
3456789
10111213141516
17181920212223
24252627282930
« Oct    

Recent Posts

  • Egypt’s Grand Museum opens, displaying Tutankhamun tomb in full for first time November 1, 2025
  • ‘Secret’ Ukraine meeting set for Madrid – El Mundo November 1, 2025
  • Why the Indian passport is falling in global ranking November 1, 2025
  • ‘I was accused of spying and beaten’ – a boy’s escape from captured Sudan city November 1, 2025
  • Turkish prosecutors hand 11 people life sentences over ski resort blaze November 1, 2025
  • Tech companies, including Meta and xAI, are using SPVs to raise tens of billions for AI data centers, letting them keep the debt off their balance sheets (Carmen Arroyo/Bloomberg) November 1, 2025
  • SNAP showdown: US judges order USDA to use emergency funds for food stamps; Trump seeks court clarification November 1, 2025

Categories Cloud

africa (3488) Americas (36979) AM Update (4387) Army (3829) Australia news (8604) Business (11245) China (5074) Culture (3497) Cyber Security (3989) cybersecurity (3333) Cyber Security News (4411) Donald Trump (4647) Environment (4606) Europe (16280) Foreign Policy (3913) france (3932) Hacking (7567) Health (3442) homesecurity (3636) IFP Exclusive (3340) India (9546) Israel (4973) Mary Patriot News (4801) Media Wire (5196) middle east (5740) Nation (10184) Nation, Nation & World (5456) Nation, World (9901) News (36810) politics (7780) russia (6440) Security (6258) Society (3226) Sports (8230) Tankers (4159) Technology (3581) UK news (18034) ukraine (5707) Uncategorized (3700) US Crime News (6249) US news (13249) US politics (20802) World (77952) World news (24677) worldNews (28030)
RSS Error: A feed could not be found at `https://nvd.nist.gov/download/nvd-rss-analyzed.xml`; the status code is `404` and content-type is `text/html;charset=UTF-8`

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

November 2025
M T W T F S S
 12
3456789
10111213141516
17181920212223
24252627282930
« Oct    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive