Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Fake Google Security Site Delivers Malicious PWA for Credential Theft

A phishing campaign is leveraging a counterfeit Google Security page to distribute a Progressive Web App capable of stealing one-time [...]
  • News
Posted on March 3, 2026 by Mash

Compromised Chrome Extension Distributed Crypto-Stealing Malware

A popular Chrome extension called QuickLens, which enabled Google Lens searches directly in the browser, was hijacked after being sold [...]
  • News
Posted on March 1, 2026 by Mash

Windows 11 Enhances Batch File Security and Audio Sharing

Microsoft is introducing new Windows 11 Insider builds that strengthen security for batch file and CMD script execution in enterprise [...]
  • News
Posted on February 28, 2026 by Mash

Vanishing Mouse Pointer Plagues Classic Outlook Users

Microsoft is investigating a persistent bug causing the mouse pointer to disappear within the classic Outlook desktop client, nearly two [...]
  • News
Posted on February 24, 2026 by Mash

Arkanix Stealer Emerges as Brief AI-Assisted Malware Venture

A new information-stealing operation called Arkanix Stealer appeared on dark web forums in late 2025 but vanished after only two [...]
  • News
Posted on February 23, 2026 by Mash

AI-Powered Android Malware Uses Gemini for Dynamic Persistence

Security researchers have identified PromptSpy, the first Android malware family that integrates generative AI directly into its operational flow. Discovered [...]
  • News
Posted on February 20, 2026 by Mash

Chinese APT Exploited Dell Zero-Day for Nine Months

A suspected Chinese state-sponsored hacking group has been actively exploiting a critical Dell vulnerability since mid-2024 in a series of [...]
  • News
Posted on February 19, 2026 by Mash

Infostealers Begin Harvesting OpenClaw AI Agent Secrets

Security researchers have documented the first real-world instance of information-stealing malware targeting configuration files belonging to the popular OpenClaw AI [...]
  • News
Posted on February 17, 2026 by Mash

DNS-Based ClickFix Attack Delivers Malware Through Nslookup Queries

Threat actors have developed an innovative ClickFix campaign that leverages DNS lookups to distribute malicious payloads, marking the first known [...]
  • News
Posted on February 16, 2026 by Mash

Cryptocurrency Coding Tests Weaponized in Developer-Targeting Scheme

A sophisticated campaign attributed to North Korean hackers is targeting JavaScript and Python developers through fake job interviews involving cryptocurrency-related [...]
  • News
Posted on February 14, 2026 by Mash

Researcher Exposes Novel LNK File Deception Methods

Security researcher Wietze Beukema has unveiled four previously undocumented techniques that manipulate Windows shortcut files to conceal malicious payloads. These [...]
  • News
Posted on February 14, 2026 by Mash

Patched Notepad Vulnerability Allowed Hidden Program Execution

Microsoft has resolved a significant security flaw in the Windows 11 Notepad application that enabled attackers to execute software remotely [...]
  • News
Posted on February 13, 2026 by Mash

Pyongyang-Aligned Cyber Actors Unleash Novel Apple Malware Suite

North Korean hackers are deploying advanced social engineering tactics combined with never-before-seen macOS malware strains to siphon cryptocurrency assets. The [...]
  • News
Posted on February 11, 2026 by Mash

Attackers Deploy Legitimate IT Tools via SolarWinds Flaws

Hackers are actively exploiting critical vulnerabilities in SolarWinds Web Help Desk (WHD) to install legitimate administrative software for harmful purposes. [...]
  • News
Posted on February 10, 2026 by Mash

New Surge of Spam Exploits Zendesk Support Systems

A widespread spam campaign is once again targeting global inboxes, with many users receiving automated messages from compromised company support [...]
  • News
Posted on February 7, 2026 by Mash

Forensic Software Driver Weaponized to Disable Security Tools

Cyber attackers are misusing a revoked but still functional kernel driver from the EnCase forensic software to create a powerful [...]
  • News
Posted on February 6, 2026 by Mash

Cyber Attackers Target Developers Through React Native Vulnerability

Hackers are actively exploiting a severe flaw, designated CVE-2025-11953, in the React Native Metro development server. This vulnerability allows them [...]
  • News
Posted on February 5, 2026 by Mash

Compelling Fixes in Latest Optional Windows 11 Update

Microsoft has issued a new optional update, KB5074105, for Windows 11 versions 24H2 and 25H2. While this C-update is not [...]
  • News
Posted on February 2, 2026 by Mash

User Reports Detail Flaws in New Windows 11 Update

Microsoft's recent optional update, KB5074105, is causing problems for some Windows 11 users despite official claims of no known issues. [...]
  • News
Posted on February 2, 2026 by Mash

Google and Partners Disrupt Massive Malware-Powered IPIDEA Proxy Network

Google's Threat Intelligence Group, in collaboration with industry partners, has disrupted the infrastructure of IPIDEA, one of the world's largest [...]
  • News
Posted on January 30, 2026 by Mash

Critical Sandbox Escape Flaws in n8n Workflow Platform Enable Host Takeover

Two critical vulnerabilities in the popular open-source automation platform n8n allow authenticated attackers to escape its security sandbox and execute [...]
  • News
Posted on January 30, 2026 by Mash

Malware Service "Stanley" Guarantees Placement of Phishing Extensions on Chrome Web Store

A new malware-as-a-service (MaaS) operation, dubbed "Stanley," is advertising the creation and publication of malicious Chrome extensions designed to bypass [...]
  • News
Posted on January 27, 2026 by Mash

North Korean APT Deploys AI-Assisted Malware Against Blockchain Developers

The North Korean state-linked hacking group Konni is conducting a campaign targeting blockchain engineers with PowerShell malware believed to be [...]
  • News
Posted on January 27, 2026 by Mash

North Korean Hackers Use AI-Generated Malware to Target Blockchain Developers

The North Korean threat group Konni is using AI-assisted PowerShell malware to target engineers and developers in the blockchain industry. [...]
  • News
Posted on January 26, 2026 by Mash

ShinyHunters Extortion Gang Claims Responsibility for SSO Vishing Attacks

The ShinyHunters cybercrime group has claimed responsibility for a series of sophisticated voice phishing (vishing) attacks targeting single sign-on accounts [...]
  • News
Posted on January 25, 2026 by Mash

Automated Attacks Target Fortinet Firewalls, Steal Configurations via SSO Flaw

A wave of automated attacks is targeting Fortinet FortiGate devices by exploiting a vulnerability in the single sign-on (SSO) feature [...]
  • News
Posted on January 24, 2026 by Mash

AI-Powered Android Malware Automates Ad Clicks in Hidden Browser

A new family of Android click-fraud trojans is using TensorFlow machine learning models to autonomously detect and interact with online [...]
  • News
Posted on January 23, 2026 by Mash

Critical Flaw in ACF Extended WordPress Plugin Allows Full Site Takeover

A critical vulnerability in the Advanced Custom Fields: Extended (ACF Extended) WordPress plugin allows unauthenticated attackers to gain administrative control [...]
  • News
Posted on January 22, 2026 by Mash

PDFSider Malware Used by Ransomware Groups to Infiltrate Major Financial Firm

A new malware strain named PDFSider has been deployed in attacks against a Fortune 100 financial company, serving as a [...]
  • News
Posted on January 21, 2026 by Mash

GhostPoster Campaign Infects 840,000 Users with Malicious Browser Extensions

A new wave of the GhostPoster campaign has been discovered, involving 17 malicious extensions across Chrome, Firefox, and Microsoft Edge [...]
  • News
Posted on January 18, 2026 by Mash

Windows 11 Enterprise PCs Fail to Shut Down After January Security Update

Microsoft has acknowledged a new bug preventing some Windows 11 Enterprise and IoT devices from shutting down properly after installing [...]
  • News
Posted on January 18, 2026 by Mash

Gootloader Malware Evades Detection with Complex, Multi-Part ZIP Archives

The Gootloader malware campaign has adopted a sophisticated evasion technique using malformed ZIP archives composed of up to 1,000 concatenated [...]
  • News
Posted on January 17, 2026 by Mash

Critical FortiSIEM Flaw Exposes Systems to Remote Code Execution

A critical vulnerability in Fortinet's Security Information and Event Management (SIEM) platform, tracked as CVE-2025-25256, allows unauthenticated remote attackers to [...]
  • News
Posted on January 16, 2026 by Mash

BreachForums Hacking Forum User Database Exposed in Leak

The user database from the latest version of the notorious BreachForums cybercrime marketplace has been leaked online, exposing information for [...]
  • News
Posted on January 12, 2026 by Mash

Unpatched Command Injection Flaw in Old D-Link Routers Under Active Exploit

A critical command injection vulnerability in several legacy D-Link DSL routers is being actively exploited by threat actors. Tracked as [...]
  • News
Posted on January 7, 2026 by Mash

Fake Windows BSOD Screens Used in ClickFix Attacks on Hotels

A new social engineering campaign is targeting the European hospitality sector by using deceptive Blue Screen of Death (BSOD) screens [...]
  • News
Posted on January 7, 2026 by Mash

Threat Actors and Resecurity Dispute Nature of Alleged Cybersecurity Breach

A threat group calling itself "Scattered Lapsus$ Hunters" claims to have successfully breached the cybersecurity firm Resecurity, stealing alleged internal [...]
  • News
Posted on January 5, 2026 by Mash

Kimwolf Botnet Exploits Proxy Networks to Infect Millions of Devices

The Kimwolf botnet has infected over two million devices globally by exploiting a critical vulnerability in residential proxy networks, allowing [...]
  • News
Posted on January 4, 2026 by Mash

Grubhub's Legitimate Subdomain Used in Crypto Multiplication Scam

Scammers have sent fraudulent emails to Grubhub users promising a tenfold return on any Bitcoin sent to a specified wallet. [...]
  • News
Posted on December 29, 2025 by Mash

Typosquatted Windows Activator Domain Distributes Malicious PowerShell Loader

A fraudulent domain masquerading as the popular Microsoft Activation Scripts (MAS) tool is being used to infect users with a [...]
  • News
Posted on December 26, 2025 by Mash

Posts navigation

Older posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software