Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Microsoft Expands Policy Allowing Admins to Remove Preinstalled Store Apps

Microsoft has updated its Windows 11 in-box app removal policy to include a dynamic list enabling IT administrators to uninstall [...]
  • News
Posted on May 3, 2026 by Mash

April Windows 11 Update Breaks Third-Party Backup Software

The KB5083769 security update for Windows 11 versions 24H2 and 25H2 is causing failures in third-party backup applications from vendors [...]
  • News
Posted on May 2, 2026 by Mash

Critical cPanel and WHM Authentication Bypass Patched in Emergency Update

A critical vulnerability affecting all but the latest versions of cPanel and WebHost Manager allows unauthenticated attackers to gain access [...]
  • News
Posted on May 1, 2026 by Mash

VECT 2.0 Ransomware Encryption Flaw Permanently Destroys Large Files

Researchers have discovered a critical flaw in VECT 2.0 ransomware that causes the malware to act as a data wiper [...]
  • News
Posted on April 30, 2026 by Mash

Robinhood Onboarding Flaw Enabled Phishing Email Injection

Attackers exploited a flaw in Robinhood's account creation process to inject phishing messages into legitimate account confirmation emails, tricking customers [...]
  • News
Posted on April 28, 2026 by Mash

UNC6692 Deploys Snow Malware Suite via Microsoft Teams Social Engineering

A threat group tracked as UNC6692 uses email bombing followed by Microsoft Teams calls impersonating IT helpdesk agents to deploy [...]
  • News
Posted on April 26, 2026 by Mash

Pack2TheRoot Vulnerability Grants Root Access via PackageKit Flaw

A high-severity vulnerability named Pack2TheRoot, tracked as CVE-2026-41651 with an 8.8 rating, has existed for nearly twelve years in the [...]
  • News
Posted on April 25, 2026 by Mash

Bitwarden CLI npm Package Compromised in Supply Chain Attack

Attackers uploaded a malicious version 2026.4.0 of the official Bitwarden CLI package to npm on April 22, operating for approximately [...]
  • News
Posted on April 25, 2026 by Mash

Kyber Ransomware Claims Post-Quantum Encryption on Windows Systems

A new ransomware operation called Kyber is targeting both Windows and VMware ESXi environments, with the Windows variant implementing Kyber1024 [...]
  • News
Posted on April 24, 2026 by Mash

Fake Wallet Apps Infiltrate Apple's China App Store to Steal Crypto

Twenty-six malicious applications infiltrated Apple's App Store in China, impersonating legitimate wallets including Metamask, Coinbase, and Trust Wallet to steal [...]
  • News
Posted on April 21, 2026 by Mash

Windows 11 May 2026 Update Prioritizes Performance and Reliability

Microsoft is rolling out significant reliability improvements to Windows 11 through upcoming April optional and May mandatory updates, with many [...]
  • News
Posted on April 21, 2026 by Mash

Critical Protobuf.js Flaw Allows Code Injection via Malicious Schemas

A critical remote code execution vulnerability in the widely used protobuf.js library enables attackers to execute arbitrary JavaScript by supplying [...]
  • News
Posted on April 20, 2026 by Mash

Payouts King Ransomware Uses QEMU Virtual Machines to Evade Detection

The Payouts King ransomware operation is leveraging the QEMU emulator to run hidden virtual machines on compromised systems, creating reverse [...]
  • News
Posted on April 18, 2026 by Mash

Hackers Leverage Hugging Face to Deploy NKAbuse via Marimo Flaw

Attackers are exploiting a critical Marimo remote code execution vulnerability tracked as CVE-2026-39987 to deliver a new variant of NKAbuse [...]
  • News
Posted on April 18, 2026 by Mash

Kraken Faces Extortion After Insider Compromises Customer Data

The Kraken cryptocurrency exchange disclosed that a cybercriminal group is attempting to extort the company by threatening to release videos [...]
  • News
Posted on April 15, 2026 by Mash

OpenAI Rotates macOS Certificates Following Axios Supply Chain Attack

OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package version 1.14.1 [...]
  • News
Posted on April 15, 2026 by Mash

Marimo Vulnerability Exploited Within Hours of Public Disclosure

Attackers began exploiting a critical unauthenticated remote code execution flaw in the Marimo Python notebook platform just ten hours after [...]
  • News
Posted on April 14, 2026 by Mash

CPUID Website Breached to Distribute Trojanized Hardware Tools

Attackers compromised the official CPUID website for approximately 19 hours between April 9 and April 10, replacing download links for [...]
  • News
Posted on April 13, 2026 by Mash

Lua-Based LucidRook Malware Targets NGOs and Universities

A sophisticated Lua-based malware called LucidRook has been deployed in spear-phishing campaigns against non-governmental organizations and universities in Taiwan, according [...]
  • News
Posted on April 11, 2026 by Mash

AI-Assisted Discovery Uncovers 13-Year-Old ActiveMQ Vulnerability

A remote code execution vulnerability in Apache ActiveMQ Classic that remained undetected for 13 years has been discovered using the [...]
  • News
Posted on April 10, 2026 by Mash

Critical Ninja Forms Flaw Allows Unauthenticated File Uploads

A severe vulnerability tracked as CVE-2026-0740 in the Ninja Forms File Uploads premium add-on for WordPress is being actively exploited, [...]
  • News
Posted on April 9, 2026 by Mash

GPUBreach Attack Exploits GPU Rowhammer for Full System Compromise

Researchers at the University of Toronto have developed a new attack called GPUBreach that induces bit flips on GDDR6 memory [...]
  • News
Posted on April 7, 2026 by Mash

Device Code Phishing Attacks Surge Dramatically as Kits Proliferate

Device code phishing attacks, which abuse the OAuth 2.0 Device Authorization Grant flow, have increased more than 37-fold this year [...]
  • News
Posted on April 5, 2026 by Mash

Malicious ChatGPT Ad Blocker Extension Stole User Conversations

A deceptive Chrome extension named ChatGPT Ad Blocker, available on the official Chrome Web Store, has been caught harvesting users' [...]
  • News
Posted on April 4, 2026 by Mash

NoVoice Android Malware Rooted Millions of Devices via Google Play

A malicious Android strain called NoVoice has infected approximately 2.3 million devices through over 50 apps on the Google Play [...]
  • News
Posted on April 2, 2026 by Mash

RoadK1ll Implant Enables Stealthy Network Pivoting Through WebSocket Tunnels

Security researchers have uncovered a new malicious implant called RoadK1ll that allows threat actors to pivot from compromised machines to [...]
  • News
Posted on April 2, 2026 by Mash

Apple Issues Lock Screen Warnings to Outdated iPhone Users

Apple has begun sending lock screen notifications to iPhones and iPads running older operating system versions, alerting users to active [...]
  • News
Posted on March 29, 2026 by Mash

TeamPCP Compromises Telnyx PyPI Package to Deliver Steganographic Malware

The TeamPCP hacking group compromised the official Telnyx PyPI package today, publishing malicious versions 4.87.1 and 4.87.2 that deliver credential-stealing [...]
  • News
Posted on March 29, 2026 by Mash

Microsoft to Sunset Legacy Cross-Signed Kernel Driver Trust

Microsoft has announced a significant change to Windows kernel policy that will phase out default trust for drivers signed under [...]
  • News
Posted on March 28, 2026 by Mash

Firefox 149 Introduces Built-In VPN with Generous Data Allowance

Mozilla has released Firefox 149 featuring an integrated VPN tool that provides up to 50 gigabytes of monthly browsing traffic [...]
  • News
Posted on March 26, 2026 by Mash

CanisterWorm Malware Spreads Through npm Packages with Destructive Capabilities

A rapidly spreading malware campaign called CanisterWorm has been infecting developer environments through over 45 compromised npm packages, with the [...]
  • News
Posted on March 24, 2026 by Mash

VoidStealer Uses Novel Debugger Trick to Extract Chrome Master Key

An information stealer called VoidStealer has introduced a new technique to bypass Chrome's Application-Bound Encryption by leveraging hardware breakpoints to [...]
  • News
Posted on March 24, 2026 by Mash

Azure Monitor Alerts Weaponized for Callback Phishing Campaign

Threat actors are exploiting Microsoft Azure Monitor alerts to send fraudulent callback phishing emails impersonating the Microsoft Security Team. The [...]
  • News
Posted on March 23, 2026 by Mash

WordPress.com Embraces AI Agents for Automated Content Management

WordPress.com has introduced new capabilities allowing AI agents to draft, edit, publish posts, manage comments, and organize website content through natural [...]
  • News
Posted on March 21, 2026 by Mash

DarkSword iOS Exploit Kit Deployed in Multi-Stage Data Theft Campaign

A sophisticated exploit framework called DarkSword has been actively targeting iPhones running iOS 18.4 through 18.7 since November 2025, stealing [...]
  • News
Posted on March 20, 2026 by Mash

Apple Debuts Background Security Updates with Critical WebKit Patch

Apple has deployed its first Background Security Improvements update, addressing a WebKit vulnerability tracked as CVE-2026-20643 across iPhones, iPads, and [...]
  • News
Posted on March 18, 2026 by Mash

Stryker Attack Leveraged Intune to Remotely Wipe Employee Devices

The cyberattack on medical technology firm Stryker last week involved threat actors using Microsoft Intune to remotely erase tens of [...]
  • News
Posted on March 18, 2026 by Mash

Betterleaks Launches as Enhanced Successor to Popular Gitleaks Tool

A new open-source utility called Betterleaks has been released to scan directories, files, and git repositories for exposed secrets such [...]
  • News
Posted on March 16, 2026 by Mash

Supply Chain Attack Injects Cryptocurrency Thief into AppsFlyer SDK

A temporary hijacking of the AppsFlyer Web SDK allowed attackers to distribute malicious JavaScript code designed to steal cryptocurrency from [...]
  • News
Posted on March 15, 2026 by Mash

Windows 11 Insider Builds Introduce Admin Controls and Setup Enhancements

Microsoft has released three new Windows 11 Insider builds across Dev, Beta, and Canary channels, introducing significant policy updates and [...]
  • News
Posted on March 15, 2026 by Mash

Posts navigation

Older posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software