Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

CPUID Website Breached to Distribute Trojanized Hardware Tools

Attackers compromised the official CPUID website for approximately 19 hours between April 9 and April 10, replacing download links for [...]
  • News
Posted on April 13, 2026 by Mash

Lua-Based LucidRook Malware Targets NGOs and Universities

A sophisticated Lua-based malware called LucidRook has been deployed in spear-phishing campaigns against non-governmental organizations and universities in Taiwan, according [...]
  • News
Posted on April 11, 2026 by Mash

AI-Assisted Discovery Uncovers 13-Year-Old ActiveMQ Vulnerability

A remote code execution vulnerability in Apache ActiveMQ Classic that remained undetected for 13 years has been discovered using the [...]
  • News
Posted on April 10, 2026 by Mash

Critical Ninja Forms Flaw Allows Unauthenticated File Uploads

A severe vulnerability tracked as CVE-2026-0740 in the Ninja Forms File Uploads premium add-on for WordPress is being actively exploited, [...]
  • News
Posted on April 9, 2026 by Mash

GPUBreach Attack Exploits GPU Rowhammer for Full System Compromise

Researchers at the University of Toronto have developed a new attack called GPUBreach that induces bit flips on GDDR6 memory [...]
  • News
Posted on April 7, 2026 by Mash

Device Code Phishing Attacks Surge Dramatically as Kits Proliferate

Device code phishing attacks, which abuse the OAuth 2.0 Device Authorization Grant flow, have increased more than 37-fold this year [...]
  • News
Posted on April 5, 2026 by Mash

Malicious ChatGPT Ad Blocker Extension Stole User Conversations

A deceptive Chrome extension named ChatGPT Ad Blocker, available on the official Chrome Web Store, has been caught harvesting users' [...]
  • News
Posted on April 4, 2026 by Mash

NoVoice Android Malware Rooted Millions of Devices via Google Play

A malicious Android strain called NoVoice has infected approximately 2.3 million devices through over 50 apps on the Google Play [...]
  • News
Posted on April 2, 2026 by Mash

RoadK1ll Implant Enables Stealthy Network Pivoting Through WebSocket Tunnels

Security researchers have uncovered a new malicious implant called RoadK1ll that allows threat actors to pivot from compromised machines to [...]
  • News
Posted on April 2, 2026 by Mash

Apple Issues Lock Screen Warnings to Outdated iPhone Users

Apple has begun sending lock screen notifications to iPhones and iPads running older operating system versions, alerting users to active [...]
  • News
Posted on March 29, 2026 by Mash

TeamPCP Compromises Telnyx PyPI Package to Deliver Steganographic Malware

The TeamPCP hacking group compromised the official Telnyx PyPI package today, publishing malicious versions 4.87.1 and 4.87.2 that deliver credential-stealing [...]
  • News
Posted on March 29, 2026 by Mash

Microsoft to Sunset Legacy Cross-Signed Kernel Driver Trust

Microsoft has announced a significant change to Windows kernel policy that will phase out default trust for drivers signed under [...]
  • News
Posted on March 28, 2026 by Mash

Firefox 149 Introduces Built-In VPN with Generous Data Allowance

Mozilla has released Firefox 149 featuring an integrated VPN tool that provides up to 50 gigabytes of monthly browsing traffic [...]
  • News
Posted on March 26, 2026 by Mash

CanisterWorm Malware Spreads Through npm Packages with Destructive Capabilities

A rapidly spreading malware campaign called CanisterWorm has been infecting developer environments through over 45 compromised npm packages, with the [...]
  • News
Posted on March 24, 2026 by Mash

VoidStealer Uses Novel Debugger Trick to Extract Chrome Master Key

An information stealer called VoidStealer has introduced a new technique to bypass Chrome's Application-Bound Encryption by leveraging hardware breakpoints to [...]
  • News
Posted on March 24, 2026 by Mash

Azure Monitor Alerts Weaponized for Callback Phishing Campaign

Threat actors are exploiting Microsoft Azure Monitor alerts to send fraudulent callback phishing emails impersonating the Microsoft Security Team. The [...]
  • News
Posted on March 23, 2026 by Mash

WordPress.com Embraces AI Agents for Automated Content Management

WordPress.com has introduced new capabilities allowing AI agents to draft, edit, publish posts, manage comments, and organize website content through natural [...]
  • News
Posted on March 21, 2026 by Mash

DarkSword iOS Exploit Kit Deployed in Multi-Stage Data Theft Campaign

A sophisticated exploit framework called DarkSword has been actively targeting iPhones running iOS 18.4 through 18.7 since November 2025, stealing [...]
  • News
Posted on March 20, 2026 by Mash

Apple Debuts Background Security Updates with Critical WebKit Patch

Apple has deployed its first Background Security Improvements update, addressing a WebKit vulnerability tracked as CVE-2026-20643 across iPhones, iPads, and [...]
  • News
Posted on March 18, 2026 by Mash

Stryker Attack Leveraged Intune to Remotely Wipe Employee Devices

The cyberattack on medical technology firm Stryker last week involved threat actors using Microsoft Intune to remotely erase tens of [...]
  • News
Posted on March 18, 2026 by Mash

Betterleaks Launches as Enhanced Successor to Popular Gitleaks Tool

A new open-source utility called Betterleaks has been released to scan directories, files, and git repositories for exposed secrets such [...]
  • News
Posted on March 16, 2026 by Mash

Supply Chain Attack Injects Cryptocurrency Thief into AppsFlyer SDK

A temporary hijacking of the AppsFlyer Web SDK allowed attackers to distribute malicious JavaScript code designed to steal cryptocurrency from [...]
  • News
Posted on March 15, 2026 by Mash

Windows 11 Insider Builds Introduce Admin Controls and Setup Enhancements

Microsoft has released three new Windows 11 Insider builds across Dev, Beta, and Canary channels, introducing significant policy updates and [...]
  • News
Posted on March 15, 2026 by Mash

AI-Crafted Slopoly Backdoor Deployed in Interlock Ransomware Campaign

A new malware strain called Slopoly, exhibiting strong signs of generative AI assistance in its development, was used in an [...]
  • News
Posted on March 14, 2026 by Mash

Critical n8n Flaws Enable Remote Code Execution and Credential Theft

Security researchers have disclosed multiple now-patched vulnerabilities in the n8n workflow automation platform, including critical flaws allowing remote code execution [...]
  • News
Posted on March 12, 2026 by Mash

Malformed Archive Technique Evades Security Detection

A newly developed method called "Zombie ZIP" allows malicious payloads to remain undetected by manipulating compressed file headers to deceive [...]
  • News
Posted on March 12, 2026 by Mash

Quick Assist Social Engineering Delivers Novel A0Backdoor via Teams

Cybercriminals are targeting employees in financial and healthcare sectors through Microsoft Teams conversations, using Quick Assist remote access tools to [...]
  • News
Posted on March 10, 2026 by Mash

Attackers Weaponize .arpa Domains and IPv6 Infrastructure for Phishing

Cybercriminals are exploiting the special-use .arpa domain and IPv6 reverse DNS mechanisms to launch phishing campaigns that evade traditional reputation-based [...]
  • News
Posted on March 10, 2026 by Mash

Termite Ransomware Affiliate Employs ClickFix Tactics in Targeted Attack

A threat actor tracked as Velvet Tempest was observed using ClickFix social engineering techniques alongside legitimate Windows tools to deploy [...]
  • News
Posted on March 9, 2026 by Mash

Bing AI Promoted Fake OpenClaw Repositories Distributing Malware

Fraudulent OpenClaw installers hosted on GitHub and promoted through Microsoft Bing's AI-powered search results were found deploying information-stealing malware to [...]
  • News
Posted on March 7, 2026 by Mash

Zero-Click Email Attack Threatens FreeScout Helpdesk Servers

A critical unauthenticated vulnerability in the FreeScout helpdesk platform enables attackers to achieve remote code execution simply by sending a [...]
  • News
Posted on March 5, 2026 by Mash

Fake Google Security Site Delivers Malicious PWA for Credential Theft

A phishing campaign is leveraging a counterfeit Google Security page to distribute a Progressive Web App capable of stealing one-time [...]
  • News
Posted on March 3, 2026 by Mash

Compromised Chrome Extension Distributed Crypto-Stealing Malware

A popular Chrome extension called QuickLens, which enabled Google Lens searches directly in the browser, was hijacked after being sold [...]
  • News
Posted on March 1, 2026 by Mash

Windows 11 Enhances Batch File Security and Audio Sharing

Microsoft is introducing new Windows 11 Insider builds that strengthen security for batch file and CMD script execution in enterprise [...]
  • News
Posted on February 28, 2026 by Mash

Vanishing Mouse Pointer Plagues Classic Outlook Users

Microsoft is investigating a persistent bug causing the mouse pointer to disappear within the classic Outlook desktop client, nearly two [...]
  • News
Posted on February 24, 2026 by Mash

Arkanix Stealer Emerges as Brief AI-Assisted Malware Venture

A new information-stealing operation called Arkanix Stealer appeared on dark web forums in late 2025 but vanished after only two [...]
  • News
Posted on February 23, 2026 by Mash

AI-Powered Android Malware Uses Gemini for Dynamic Persistence

Security researchers have identified PromptSpy, the first Android malware family that integrates generative AI directly into its operational flow. Discovered [...]
  • News
Posted on February 20, 2026 by Mash

Chinese APT Exploited Dell Zero-Day for Nine Months

A suspected Chinese state-sponsored hacking group has been actively exploiting a critical Dell vulnerability since mid-2024 in a series of [...]
  • News
Posted on February 19, 2026 by Mash

Infostealers Begin Harvesting OpenClaw AI Agent Secrets

Security researchers have documented the first real-world instance of information-stealing malware targeting configuration files belonging to the popular OpenClaw AI [...]
  • News
Posted on February 17, 2026 by Mash

DNS-Based ClickFix Attack Delivers Malware Through Nslookup Queries

Threat actors have developed an innovative ClickFix campaign that leverages DNS lookups to distribute malicious payloads, marking the first known [...]
  • News
Posted on February 16, 2026 by Mash

Posts navigation

Older posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software