Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

VoidStealer Uses Novel Debugger Trick to Extract Chrome Master Key

An information stealer called VoidStealer has introduced a new technique to bypass Chrome's Application-Bound Encryption by leveraging hardware breakpoints to [...]
  • News
Posted on March 24, 2026 by Mash

Azure Monitor Alerts Weaponized for Callback Phishing Campaign

Threat actors are exploiting Microsoft Azure Monitor alerts to send fraudulent callback phishing emails impersonating the Microsoft Security Team. The [...]
  • News
Posted on March 23, 2026 by Mash

WordPress.com Embraces AI Agents for Automated Content Management

WordPress.com has introduced new capabilities allowing AI agents to draft, edit, publish posts, manage comments, and organize website content through natural [...]
  • News
Posted on March 21, 2026 by Mash

DarkSword iOS Exploit Kit Deployed in Multi-Stage Data Theft Campaign

A sophisticated exploit framework called DarkSword has been actively targeting iPhones running iOS 18.4 through 18.7 since November 2025, stealing [...]
  • News
Posted on March 20, 2026 by Mash

Apple Debuts Background Security Updates with Critical WebKit Patch

Apple has deployed its first Background Security Improvements update, addressing a WebKit vulnerability tracked as CVE-2026-20643 across iPhones, iPads, and [...]
  • News
Posted on March 18, 2026 by Mash

Stryker Attack Leveraged Intune to Remotely Wipe Employee Devices

The cyberattack on medical technology firm Stryker last week involved threat actors using Microsoft Intune to remotely erase tens of [...]
  • News
Posted on March 18, 2026 by Mash

Betterleaks Launches as Enhanced Successor to Popular Gitleaks Tool

A new open-source utility called Betterleaks has been released to scan directories, files, and git repositories for exposed secrets such [...]
  • News
Posted on March 16, 2026 by Mash

Supply Chain Attack Injects Cryptocurrency Thief into AppsFlyer SDK

A temporary hijacking of the AppsFlyer Web SDK allowed attackers to distribute malicious JavaScript code designed to steal cryptocurrency from [...]
  • News
Posted on March 15, 2026 by Mash

Windows 11 Insider Builds Introduce Admin Controls and Setup Enhancements

Microsoft has released three new Windows 11 Insider builds across Dev, Beta, and Canary channels, introducing significant policy updates and [...]
  • News
Posted on March 15, 2026 by Mash

AI-Crafted Slopoly Backdoor Deployed in Interlock Ransomware Campaign

A new malware strain called Slopoly, exhibiting strong signs of generative AI assistance in its development, was used in an [...]
  • News
Posted on March 14, 2026 by Mash

Critical n8n Flaws Enable Remote Code Execution and Credential Theft

Security researchers have disclosed multiple now-patched vulnerabilities in the n8n workflow automation platform, including critical flaws allowing remote code execution [...]
  • News
Posted on March 12, 2026 by Mash

Malformed Archive Technique Evades Security Detection

A newly developed method called "Zombie ZIP" allows malicious payloads to remain undetected by manipulating compressed file headers to deceive [...]
  • News
Posted on March 12, 2026 by Mash

Quick Assist Social Engineering Delivers Novel A0Backdoor via Teams

Cybercriminals are targeting employees in financial and healthcare sectors through Microsoft Teams conversations, using Quick Assist remote access tools to [...]
  • News
Posted on March 10, 2026 by Mash

Attackers Weaponize .arpa Domains and IPv6 Infrastructure for Phishing

Cybercriminals are exploiting the special-use .arpa domain and IPv6 reverse DNS mechanisms to launch phishing campaigns that evade traditional reputation-based [...]
  • News
Posted on March 10, 2026 by Mash

Termite Ransomware Affiliate Employs ClickFix Tactics in Targeted Attack

A threat actor tracked as Velvet Tempest was observed using ClickFix social engineering techniques alongside legitimate Windows tools to deploy [...]
  • News
Posted on March 9, 2026 by Mash

Bing AI Promoted Fake OpenClaw Repositories Distributing Malware

Fraudulent OpenClaw installers hosted on GitHub and promoted through Microsoft Bing's AI-powered search results were found deploying information-stealing malware to [...]
  • News
Posted on March 7, 2026 by Mash

Zero-Click Email Attack Threatens FreeScout Helpdesk Servers

A critical unauthenticated vulnerability in the FreeScout helpdesk platform enables attackers to achieve remote code execution simply by sending a [...]
  • News
Posted on March 5, 2026 by Mash

Fake Google Security Site Delivers Malicious PWA for Credential Theft

A phishing campaign is leveraging a counterfeit Google Security page to distribute a Progressive Web App capable of stealing one-time [...]
  • News
Posted on March 3, 2026 by Mash

Compromised Chrome Extension Distributed Crypto-Stealing Malware

A popular Chrome extension called QuickLens, which enabled Google Lens searches directly in the browser, was hijacked after being sold [...]
  • News
Posted on March 1, 2026 by Mash

Windows 11 Enhances Batch File Security and Audio Sharing

Microsoft is introducing new Windows 11 Insider builds that strengthen security for batch file and CMD script execution in enterprise [...]
  • News
Posted on February 28, 2026 by Mash

Vanishing Mouse Pointer Plagues Classic Outlook Users

Microsoft is investigating a persistent bug causing the mouse pointer to disappear within the classic Outlook desktop client, nearly two [...]
  • News
Posted on February 24, 2026 by Mash

Arkanix Stealer Emerges as Brief AI-Assisted Malware Venture

A new information-stealing operation called Arkanix Stealer appeared on dark web forums in late 2025 but vanished after only two [...]
  • News
Posted on February 23, 2026 by Mash

AI-Powered Android Malware Uses Gemini for Dynamic Persistence

Security researchers have identified PromptSpy, the first Android malware family that integrates generative AI directly into its operational flow. Discovered [...]
  • News
Posted on February 20, 2026 by Mash

Chinese APT Exploited Dell Zero-Day for Nine Months

A suspected Chinese state-sponsored hacking group has been actively exploiting a critical Dell vulnerability since mid-2024 in a series of [...]
  • News
Posted on February 19, 2026 by Mash

Infostealers Begin Harvesting OpenClaw AI Agent Secrets

Security researchers have documented the first real-world instance of information-stealing malware targeting configuration files belonging to the popular OpenClaw AI [...]
  • News
Posted on February 17, 2026 by Mash

DNS-Based ClickFix Attack Delivers Malware Through Nslookup Queries

Threat actors have developed an innovative ClickFix campaign that leverages DNS lookups to distribute malicious payloads, marking the first known [...]
  • News
Posted on February 16, 2026 by Mash

Cryptocurrency Coding Tests Weaponized in Developer-Targeting Scheme

A sophisticated campaign attributed to North Korean hackers is targeting JavaScript and Python developers through fake job interviews involving cryptocurrency-related [...]
  • News
Posted on February 14, 2026 by Mash

Researcher Exposes Novel LNK File Deception Methods

Security researcher Wietze Beukema has unveiled four previously undocumented techniques that manipulate Windows shortcut files to conceal malicious payloads. These [...]
  • News
Posted on February 14, 2026 by Mash

Patched Notepad Vulnerability Allowed Hidden Program Execution

Microsoft has resolved a significant security flaw in the Windows 11 Notepad application that enabled attackers to execute software remotely [...]
  • News
Posted on February 13, 2026 by Mash

Pyongyang-Aligned Cyber Actors Unleash Novel Apple Malware Suite

North Korean hackers are deploying advanced social engineering tactics combined with never-before-seen macOS malware strains to siphon cryptocurrency assets. The [...]
  • News
Posted on February 11, 2026 by Mash

Attackers Deploy Legitimate IT Tools via SolarWinds Flaws

Hackers are actively exploiting critical vulnerabilities in SolarWinds Web Help Desk (WHD) to install legitimate administrative software for harmful purposes. [...]
  • News
Posted on February 10, 2026 by Mash

New Surge of Spam Exploits Zendesk Support Systems

A widespread spam campaign is once again targeting global inboxes, with many users receiving automated messages from compromised company support [...]
  • News
Posted on February 7, 2026 by Mash

Forensic Software Driver Weaponized to Disable Security Tools

Cyber attackers are misusing a revoked but still functional kernel driver from the EnCase forensic software to create a powerful [...]
  • News
Posted on February 6, 2026 by Mash

Cyber Attackers Target Developers Through React Native Vulnerability

Hackers are actively exploiting a severe flaw, designated CVE-2025-11953, in the React Native Metro development server. This vulnerability allows them [...]
  • News
Posted on February 5, 2026 by Mash

Compelling Fixes in Latest Optional Windows 11 Update

Microsoft has issued a new optional update, KB5074105, for Windows 11 versions 24H2 and 25H2. While this C-update is not [...]
  • News
Posted on February 2, 2026 by Mash

User Reports Detail Flaws in New Windows 11 Update

Microsoft's recent optional update, KB5074105, is causing problems for some Windows 11 users despite official claims of no known issues. [...]
  • News
Posted on February 2, 2026 by Mash

Google and Partners Disrupt Massive Malware-Powered IPIDEA Proxy Network

Google's Threat Intelligence Group, in collaboration with industry partners, has disrupted the infrastructure of IPIDEA, one of the world's largest [...]
  • News
Posted on January 30, 2026 by Mash

Critical Sandbox Escape Flaws in n8n Workflow Platform Enable Host Takeover

Two critical vulnerabilities in the popular open-source automation platform n8n allow authenticated attackers to escape its security sandbox and execute [...]
  • News
Posted on January 30, 2026 by Mash

Malware Service "Stanley" Guarantees Placement of Phishing Extensions on Chrome Web Store

A new malware-as-a-service (MaaS) operation, dubbed "Stanley," is advertising the creation and publication of malicious Chrome extensions designed to bypass [...]
  • News
Posted on January 27, 2026 by Mash

North Korean APT Deploys AI-Assisted Malware Against Blockchain Developers

The North Korean state-linked hacking group Konni is conducting a campaign targeting blockchain engineers with PowerShell malware believed to be [...]
  • News
Posted on January 27, 2026 by Mash

Posts navigation

Older posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software