Skip to content
Wildcat Cyber Patrol
    HomeDownload

Author: Mash

QBot's New Campaign Uses WordPad For Windows 10 As An Infection Vector

QBot malware has been spotted to abuse a DLL hijacking vulnerability in the Windows 10 WordPad to infect targeted devices. [...]

  • News
Posted on May 29, 2023 by Mash

Mozilla Removes Intrusive Firefox VPN Ads Due To Users Complaints

Mozilla recently started showing users fullscreen ads for their Mozilla VPN in Firefox, which disable the browser's functionality until closed. [...]

  • News
Posted on May 27, 2023 by Mash

CosmicEnergy Malware Attacks Remote Terminal Units In Various Industrial Systems

According to Mandiant security researchers, a hacking group linked to the Russian cybersecurity outfit Rostelecom-Solaris attempting to disrupt the work [...]

  • News
Posted on May 27, 2023 by Mash

Microsoft Exchange Services Targeted By New PowerShell Malware

A new PowerShell malware named PowerExchange is used to backdoor on-premise Microsoft Exchange servers. The malware is linked to APT34 Iranian [...]

  • News
Posted on May 26, 2023 by Mash

Microsoft Announced Native Support For 7-Zip And RAR For Windows 11

During the Build 2023 conference, Microsoft announced several upcoming Windows 11 features, including Windows 11 getting native support for RAR, [...]

  • News
Posted on May 25, 2023 by Mash

Upcoming Microsoft's Edge Feature 'Edge For Gamers' Promises To Improve User's Gaming Experience

Microsoft attempts to attract gamers into using Microsoft Edge by adding the 'Edge for Gamers' feature to enhance the gaming [...]

  • News
Posted on May 23, 2023 by Mash

New Malware Campaign Using Fake CapCut Websites For Distribution

CapCut, ByteDance's official video editor and maker for TikTok, is being impersonated in the ongoing campaign to distribute various malware [...]

  • News
Posted on May 22, 2023 by Mash

SATA BIOS Bug Reappears In Windows 11

A very old SATA BIOS bug known to affect Windows 7, 8, 8.1, and 10 has also been confirmed to [...]

  • News
Posted on May 21, 2023 by Mash

Three Recent Vulnerabilities Affecting iPhones, iPads, and Macs Fixed By Apple

Apple has addressed three vulnerabilities found in the multi-platform WebKit browser engine. One of the vulnerabilities is a sandbox escape, [...]

  • News
Posted on May 20, 2023 by Mash

Microsoft's VSCode Marketplace Attacked Via Malicious Visual Studio Extensions

Three malicious Visual Studio extensions have been found on Microsoft's VSCode marketplace, totaling over 46,000 downloads. Those extensions allow attackers [...]

  • News
Posted on May 19, 2023 by Mash

APT Hacking Groop Lancefly Attacks Organizations Using MerDoor Malware

According to Symantec Threat Labs report, APT hacking group Lancefly is targeting government organizations in SEA region using the MerDoor [...]

  • News
Posted on May 17, 2023 by Mash

Microsoft Spams Windows 10 Users With Windows 11 Ads

With Windows 10 getting closer to the end of its support, many users started encountering pop-up ads on Windows 11 [...]

  • News
Posted on May 16, 2023 by Mash

Outlook Zero-Click Vulnerability Fixed By Microsoft

A recently reported Outlook vulnerability that allowed attackers to bypass recent patches has been released by Microsoft. One of the [...]

  • News
Posted on May 13, 2023 by Mash

Aurora Data Stealing Malware Distributed Via Fake In-browser Windows Updates

Aurora, a known data-stealing malware that has existed for some time already, is currently pushed using pop-up ads warning users [...]

  • News
Posted on May 12, 2023 by Mash

Intel Boot Guard Private Keys Leaked - Investigation Opened

Intel's investigation of the Boot Guard private keys leaking is ongoing. The Money Message group is behind the data theft, [...]

  • News
Posted on May 10, 2023 by Mash

Cactus Ransomware Abuses Vulnerabilities In VPN Appliances

Cactus ransomware, discovered this March, has been abusing vulnerabilities in VPN appliances to get initial access to the targeted network. [...]

  • News
Posted on May 9, 2023 by Mash

Private Twitter Circle Tweets Were Made Public By Security Incident

Twitter has stated that due to the security incident, the tweets sent to the private Twitter Circles were shown to [...]

  • News
Posted on May 8, 2023 by Mash

Kimsuky Hackers Use Recon Malware ReconShark To Find Openings In Security

The North Korean hacking group known as Kimsuky is employing the new reconnaissance malware ReconShark to explore organizations which security [...]

  • News
Posted on May 6, 2023 by Mash

1Password Claims Recent Password Change Notifications Were Caused By Service Disruption Rather Than Security Breach

1Password's CTO, Pedro Canahuati, has provided details on the recent password change notifications incident, claiming that 1Password experienced a brief [...]

  • News
Posted on May 4, 2023 by Mash

LOBSHOT Malware Abuses Google Ads And VNC Access To Take Over Windows Systems

Recently the technique of using Google advertisements to impersonate legitimate websites to distribute malware has been used by many malware [...]

  • News
Posted on May 3, 2023 by Mash

Microsoft Published Roadmap For Hardening Changes For Various Protocols

Last few years, Microsoft has been making hardening changes to several protocols so that recently discovered vulnerabilities couldn't be easily [...]

  • News
Posted on May 1, 2023 by Mash

Updated ViperSoftX Malware Steals Data From Password Managers

According to Trend Micro security researchers, a new version of ViperSoftX data-stealing malware has been found to target password managers, [...]

  • News
Posted on April 30, 2023 by Mash

Tencent QQ Attacked By 'Evasive Panda' Hacking Group

A Chinese hacking group known as 'Evasive Panda' is linked to the cyberattack targeting Tencent QQ users using MsgBot malware. [...]

  • News
Posted on April 28, 2023 by Mash

New Update For Google Authenticator App Stores Users 2FA Codes In Cloud

A new update for the Google Authenticator app brings storage for 2FA codes as well as multi-device support. Without this [...]

  • News
Posted on April 27, 2023 by Mash

VirusTotal Announced The Launch Of An AI Code Analysis Feature

VirusTotal's Code Insight is a new AI-based code analysis feature powered by Workbench that analyzes potentially harmful files. The feature [...]

  • News
Posted on April 26, 2023 by Mash

Used Corporate Routers Might Help Threat Actors To Breach Enterprise Networks

According to researchers from cybersecurity company ESET, the full configuration data could still be accessed on most used corporate routers [...]

  • News
Posted on April 25, 2023 by Mash

GCP Vulnerability That Allowed Threat Actors To Backdoor Google Accounts Addressed By Google

A global security patch that rolled out in early April 2023 has addressed the Google Cloud Platform vulnerability. The flaw [...]

  • News
Posted on April 24, 2023 by Mash

Microsoft's Defender Update Brings Inconsistencies With Hardware Stack Protection Feature

Microsoft's Defender new update has brought a new feature called 'Kernel-mode Hardware-enforced Stack Protection.' However, Microsoft failed to communicate the [...]

  • News
Posted on April 21, 2023 by Mash

Microsoft's Threat Intelligence Defender Database Now Has URL And File Hash Search

Cybersecurity researchers can now use Microsoft's Threat Intelligence Defender database using file hashes and URLs thanks to the update brought [...]

  • News
Posted on April 20, 2023 by Mash

APT41 Hacking Group Abusing Google Command And Control Red Team Tool In Cyberattacks

APT41, known as HOODOO, is a Chinese state-sponsored hacking group that has recently been discovered to abuse Google Command and [...]

  • How-to
Posted on April 19, 2023 by Mash

Vice Society Ransomware Gang Uses Complicated PowerShell Script To Steal Data

The Vice Society ransomware gang has been seen to use a new PowerShell script to automate data theft processes. The [...]

  • News
Posted on April 17, 2023 by Mash

Microsoft Working On Fixing Outlook Users Unable To Access Emails

Microsoft is working on a fix for the issue brought by Outlook Version  2303 when some of the users are [...]

  • News
Posted on April 15, 2023 by Mash

Windows Common Log File System Zero-day Patched Fixed By Microsoft

Windows zero-day in Common Log File System that was previously exploited to drop Nokoyawa ransomware has been patched by Microsoft. [...]

  • News
Posted on April 13, 2023 by Mash

Apple's Emergency Updates Address Recently Discovered Zero-days Affecting Older iPhones and iPads

Apple has rolled out security updates that fix two recently discovered and exploited in-the-wild vulnerabilities affecting older iPhones, iPads, and [...]

  • News
Posted on April 12, 2023 by Mash

Proof-Of-Concept Exploit Code InVM2 JS Library Released

An exploit has been discovered for the critical high vulnerability in the VM2 JavaScript library. The abused vulnerability got the [...]

  • News
Posted on April 9, 2023 by Mash

Rilide Browser Extension Used In Crypto Stealing Campaign

A malicious browser extension Rilide is actively used in crypto-stealing attacks targeting Chromium-based products. The extension has various capabilities, including monitoring [...]

  • News
Posted on April 8, 2023 by Mash

HP Announces Patch To Critical LaserJet Printer Vulnerability Will Be Patched Within 90 Days

According to HP's security bulletin, the critical vulnerability tracked as CVE-2023-1707 affecting several HP LaserJet printers will be patched within [...]

  • News
Posted on April 6, 2023 by Mash

Money Message Ransomware Demands Enormous Ransoms To Decrypt Victim's Files

A new ransomware gang called 'Money Message' is currently targeting victims across the globe, asking for million-dollar ransoms for a [...]

  • News
Posted on April 3, 2023 by Mash

OneNote's Security Improvements Will Feature Blocking Of 120 Potentially Malicious File Extensions

According to Microsoft 365 road map published recently, Microsoft's OneNote will get security improvements that will help to protect users [...]

  • News
Posted on April 1, 2023 by Mash

Malicious Tor Browsers Steal Cryptocurrency From Eastern Europeans

According to Kaspersky's Lab report, trojanized Tor browsers are used to steal cryptocurrency transactions. The campaign mostly targets Russians and [...]

  • News
Posted on March 30, 2023 by Mash

Posts navigation

Older posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

© 2023 Greatis Software