Skip to content

October 29, 2025

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Digital Attack Map
    • Real-time web monitor AKAMAI
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

github

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations

EntraGoat is a purpose-built tool that sets up a vulnerable Microsoft Entra ID environment to mimic real-world identity security issues. It’s designed to help security professionals practice spotting and exploiting common misconfigurations. The tool cr…

August 12, 2025
0 comment
Read More >>

Concentric AI enhances data security with new platform integrations

Concentric AI announced new integrations that enhance the AI-driven capabilities of its Semantic Intelligence data security governance platform, expanding data governance functionality for organizations. Concentric AI’s new integration with Wiz, gives …

August 6, 2025
0 comment
Read More >>

BloodHound 8.0 debuts with major upgrades in attack path management

SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a major advanceme…

August 5, 2025
0 comment
Read More >>

Open-source password recovery utility Hashcat 7.0.0 released

Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms. It runs on CPUs, GPUs, and other hardware accelerators across Linux, Windows, and macOS, and includes features for d…

August 4, 2025
0 comment
Read More >>

Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media

A sophisticated cyberattack campaign disrupted the Russian IT industry and entities in several other countries, leveraging advanced evasion techniques to deploy the notorious Cobalt Strike Beacon. Attackers ingeniously concealed payload information wit…

July 30, 2025
0 comment
Read More >>

Artemis: Open-source modular vulnerability scanner

Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into easy-to-understand messages that can be shared with the organizations being scanned. “The most important…

July 30, 2025
0 comment
Read More >>

GitHub Outage Hits Users Globally, Core Services Unavailable

GitHub experienced a significant global outage on July 28-29, 2025, disrupting core services used by millions of developers worldwide. The incident, which lasted approximately eight hours, affected API requests, Issues, and Pull Requests functionality …

July 29, 2025
0 comment
Read More >>

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities

Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how data moves through an application, from user input to server output. This helps it spot complex, multi-step vulnerabili…

July 28, 2025
0 comment
Read More >>

Hacker Added Prompt to Amazon Q to Erase Files and Cloud Data

A hacker injected a malicious prompt into Amazon Q via GitHub, aiming to delete user files and wipe AWS data, exposing a major security flaw.

July 25, 2025
0 comment
Read More >>

Autoswagger: Open-source tool to expose hidden API authorization flaws

Autoswagger is a free, open-source tool that scans OpenAPI-documented APIs for broken authorization vulnerabilities. These flaws are still common, even at large enterprises with mature security teams, and are especially dangerous because they can be ex…

July 24, 2025
0 comment
Read More >>
1 … 3 4 5 6 7 … 25

Archives

October 2025
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Sep    

Recent Posts

  • Netanyahu strikes Gaza: Donald Trump explains why Israelis should hit back; maintains ‘nothing would jeopardise ceasefire’ October 29, 2025
  • Trump’s trade deals: Japan charms with $490 bn deal but South Korea in doubt; what’s the holdup? October 29, 2025
  • Israel launches strikes on Gaza, claiming Hamas violated truce – The Washington Post October 29, 2025
  • White House pushed Navy celebration officials to launch live explosives over dummies as Trump ‘needed to see explosions’: report October 29, 2025
  • Pakistan’s Lahore Becomes World’s Most Polluted City: Report October 29, 2025
  • Mystery drone downed near US Army base close to Russia – NATO state October 29, 2025
  • Patient lives with pig kidney for a record-setting 271 days October 29, 2025

Categories Cloud

africa (3460) Americas (36766) AM Update (4373) Army (3804) Australia news (8564) Business (11184) China (5027) Culture (3485) Cyber Security (3960) cybersecurity (3312) Cyber Security News (4382) Donald Trump (4616) Environment (4582) Europe (16197) Foreign Policy (3896) france (3897) Hacking (7551) Health (3425) homesecurity (3636) IFP Exclusive (3325) India (9462) Israel (4958) Mary Patriot News (4801) Media Wire (5176) middle east (5720) Nation (10124) Nation, Nation & World (5418) Nation, World (9835) News (36647) politics (7746) russia (6406) Security (6229) Society (3202) Sports (8220) Tankers (4129) Technology (3556) UK news (17940) ukraine (5689) Uncategorized (3696) US Crime News (6228) US news (13177) US politics (20696) World (77522) World news (24604) worldNews (27880)
RSS Error: A feed could not be found at `https://nvd.nist.gov/download/nvd-rss-analyzed.xml`; the status code is `404` and content-type is `text/html;charset=UTF-8`

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

October 2025
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Sep    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive