Skip to content

July 18, 2025

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Digital Attack Map
    • Real-time web monitor AKAMAI
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Cyber Security

FortiWeb SQL Injection Vulnerability Allows Attackers to Execute Malicious SQL Commands

A critical security vulnerability has been discovered in Fortinet’s FortiWeb web application firewall that allows unauthenticated attackers to execute malicious SQL commands through the device’s graphical user interface. The flaw, designate…

July 9, 2025
0 comment
Read More >>

Zoom for Windows Flaw Allows Attackers to Trigger DoS Attacks

Security researchers have uncovered two significant vulnerabilities in Zoom Clients for Windows, exposing users to potential Denial of Service (DoS) attacks. The flaws, identified as classic buffer overflow vulnerabilities, could allow an authorized us…

July 9, 2025
0 comment
Read More >>

11 Google-Verified Chrome Extensions Infected Over 1.7 Million Users

A chilling discovery by Koi Security has exposed a sophisticated browser hijacking campaign dubbed “RedDirection,” compromising over 1.7 million users through 11 Google-verified Chrome extensions. This operation, which also spans Microsoft …

July 9, 2025
0 comment
Read More >>

New Report Finds Billions of Leaked Credentials and ULP Files on Dark Web Are Outdated

A recent in-depth analysis by threat intelligence experts sheds critical light on the pervasive issue of outdated and unreliable data circulating on the dark web. The report, spanning a comprehensive 26-minute read, delves into the world of combolists …

July 8, 2025
0 comment
Read More >>

China-Linked VELETRIX Loader Used in Attacks on Telecommunications Infrastructure

A China-Nexus Threat Actor has launched a highly advanced assault against China Mobile Tietong Co., Ltd., a division of China Mobile, one of the biggest telecom behemoths in the nation, in a compelling illustration of state-aligned cyberwarfare. Named …

July 8, 2025
0 comment
Read More >>

XMRig Malware Disables Windows Updates and Scheduled Tasks to Maintain Persistence

Monero (XMR), a cryptocurrency, saw a spectacular surge in early 2025, rising 45% from $196 to $285 by May, with a notable peak in April. This surge coincided with a high-profile Bitcoin theft in the US, where the stolen assets were reportedly converte…

July 8, 2025
0 comment
Read More >>

BERT Ransomware Can Force Shutdown of ESXi Virtual Machines to Hinder Recovery

A newly identified ransomware group, BERT, tracked by Trend Micro as Water Pombero, has emerged as a significant threat to organizations across Asia, Europe, and the US. First observed in April, BERT targets critical sectors such as healthcare, technol…

July 8, 2025
0 comment
Read More >>

Hackers Manipulate Search Results to Target IT Pros with Trojanized PuTTY and WinSCP

Arctic Wolf has uncovered a cunning cybersecurity threat that exploits search engine optimization (SEO) poisoning and malvertising tactics to distribute Trojanized versions of widely used IT tools such as PuTTY and WinSCP. This campaign cunningly targe…

July 8, 2025
0 comment
Read More >>

Researchers Reveal Scatter Spider’s Tools, Tactics, and Key Indicators

Check Point Research has revealed important details about the phishing domain patterns and advanced attack techniques of the infamous Scattered Spider organization, which has brought a new wave of cyberthreats under close investigation. Known for their…

July 8, 2025
0 comment
Read More >>

New LogoKit Phishing Campaign Exploits Cloudflare Turnstile and Amazon S3 for Higher Success Rates

Cyble Research and Intelligence Labs (CRIL) recently discovered a very advanced phishing campaign that used the LogoKit phishing kit, which was initially discovered in 2021, to pose as reliable organizations such as Hungary’s Computer Emergency R…

July 8, 2025
0 comment
Read More >>
1 … 15 16 17 18 19 … 284

Archives

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Jun    

Recent Posts

  • Key players in Syria’s latest violence, from the Druze and Bedouin to government forces July 18, 2025
  • Donald Trump orders release of files on Jeffrey Epstein as 2003 sexually suggestive letter surfaces July 18, 2025
  • Trump seeks release of grand jury transcripts as Epstein uproar widens July 18, 2025
  • UK lowers voting age to 16 in historic electoral reform July 18, 2025
  • Tomorrowland festival begins days after fire destroyed main stage July 18, 2025
  • Trump threatens lawsuit over Epstein letter, orders release of grand jury transcripts July 18, 2025
  • The ‘Late’ Show: End of an era as CBS cancels Trump critique’s Stephen Colbert’s popular show – here is why July 18, 2025

Categories Cloud

africa (2916) Americas (30929) AM Update (3987) Army (2936) Australia news (7332) Business (9583) China (4135) Culture (2890) cybersecurity (2755) Cyber Security (2834) Cyber Security News (3282) Donald Trump (3513) Environment (3815) Europe (13560) Foreign Policy (2965) france (3106) Hacking (7067) Health (2908) homesecurity (3593) IFP Exclusive (2714) India (6731) Israel (3778) Mary Patriot News (4801) Media Wire (4163) middle east (4563) Nation (8550) Nation, Nation & World (4453) Nation, World (7930) News (30352) politics (6571) russia (5258) Security (5221) Society (2751) Sports (7968) Tankers (3404) Technology (2942) UK news (15105) ukraine (4919) Uncategorized (3504) US Crime News (5375) US news (10618) US politics (17165) World (64499) World news (20476) worldNews (23224)
RSS Error: A feed could not be found at `https://nvd.nist.gov/download/nvd-rss-analyzed.xml`; the status code is `200` and content-type is `text/html;charset=UTF-8`

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Jun    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive