Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Pyongyang-Aligned Cyber Actors Unleash Novel Apple Malware Suite

North Korean hackers are deploying advanced social engineering tactics combined with never-before-seen macOS malware strains to siphon cryptocurrency assets. The [...]
  • News
Posted on February 11, 2026 by Mash

Attackers Deploy Legitimate IT Tools via SolarWinds Flaws

Hackers are actively exploiting critical vulnerabilities in SolarWinds Web Help Desk (WHD) to install legitimate administrative software for harmful purposes. [...]
  • News
Posted on February 10, 2026 by Mash

New Surge of Spam Exploits Zendesk Support Systems

A widespread spam campaign is once again targeting global inboxes, with many users receiving automated messages from compromised company support [...]
  • News
Posted on February 7, 2026 by Mash

Forensic Software Driver Weaponized to Disable Security Tools

Cyber attackers are misusing a revoked but still functional kernel driver from the EnCase forensic software to create a powerful [...]
  • News
Posted on February 6, 2026 by Mash

Cyber Attackers Target Developers Through React Native Vulnerability

Hackers are actively exploiting a severe flaw, designated CVE-2025-11953, in the React Native Metro development server. This vulnerability allows them [...]
  • News
Posted on February 5, 2026 by Mash

Compelling Fixes in Latest Optional Windows 11 Update

Microsoft has issued a new optional update, KB5074105, for Windows 11 versions 24H2 and 25H2. While this C-update is not [...]
  • News
Posted on February 2, 2026 by Mash

User Reports Detail Flaws in New Windows 11 Update

Microsoft's recent optional update, KB5074105, is causing problems for some Windows 11 users despite official claims of no known issues. [...]
  • News
Posted on February 2, 2026 by Mash

Google and Partners Disrupt Massive Malware-Powered IPIDEA Proxy Network

Google's Threat Intelligence Group, in collaboration with industry partners, has disrupted the infrastructure of IPIDEA, one of the world's largest [...]
  • News
Posted on January 30, 2026 by Mash

Critical Sandbox Escape Flaws in n8n Workflow Platform Enable Host Takeover

Two critical vulnerabilities in the popular open-source automation platform n8n allow authenticated attackers to escape its security sandbox and execute [...]
  • News
Posted on January 30, 2026 by Mash

Malware Service "Stanley" Guarantees Placement of Phishing Extensions on Chrome Web Store

A new malware-as-a-service (MaaS) operation, dubbed "Stanley," is advertising the creation and publication of malicious Chrome extensions designed to bypass [...]
  • News
Posted on January 27, 2026 by Mash

North Korean APT Deploys AI-Assisted Malware Against Blockchain Developers

The North Korean state-linked hacking group Konni is conducting a campaign targeting blockchain engineers with PowerShell malware believed to be [...]
  • News
Posted on January 27, 2026 by Mash

North Korean Hackers Use AI-Generated Malware to Target Blockchain Developers

The North Korean threat group Konni is using AI-assisted PowerShell malware to target engineers and developers in the blockchain industry. [...]
  • News
Posted on January 26, 2026 by Mash

ShinyHunters Extortion Gang Claims Responsibility for SSO Vishing Attacks

The ShinyHunters cybercrime group has claimed responsibility for a series of sophisticated voice phishing (vishing) attacks targeting single sign-on accounts [...]
  • News
Posted on January 25, 2026 by Mash

Automated Attacks Target Fortinet Firewalls, Steal Configurations via SSO Flaw

A wave of automated attacks is targeting Fortinet FortiGate devices by exploiting a vulnerability in the single sign-on (SSO) feature [...]
  • News
Posted on January 24, 2026 by Mash

AI-Powered Android Malware Automates Ad Clicks in Hidden Browser

A new family of Android click-fraud trojans is using TensorFlow machine learning models to autonomously detect and interact with online [...]
  • News
Posted on January 23, 2026 by Mash

Critical Flaw in ACF Extended WordPress Plugin Allows Full Site Takeover

A critical vulnerability in the Advanced Custom Fields: Extended (ACF Extended) WordPress plugin allows unauthenticated attackers to gain administrative control [...]
  • News
Posted on January 22, 2026 by Mash

PDFSider Malware Used by Ransomware Groups to Infiltrate Major Financial Firm

A new malware strain named PDFSider has been deployed in attacks against a Fortune 100 financial company, serving as a [...]
  • News
Posted on January 21, 2026 by Mash

GhostPoster Campaign Infects 840,000 Users with Malicious Browser Extensions

A new wave of the GhostPoster campaign has been discovered, involving 17 malicious extensions across Chrome, Firefox, and Microsoft Edge [...]
  • News
Posted on January 18, 2026 by Mash

Windows 11 Enterprise PCs Fail to Shut Down After January Security Update

Microsoft has acknowledged a new bug preventing some Windows 11 Enterprise and IoT devices from shutting down properly after installing [...]
  • News
Posted on January 18, 2026 by Mash

Gootloader Malware Evades Detection with Complex, Multi-Part ZIP Archives

The Gootloader malware campaign has adopted a sophisticated evasion technique using malformed ZIP archives composed of up to 1,000 concatenated [...]
  • News
Posted on January 17, 2026 by Mash

Critical FortiSIEM Flaw Exposes Systems to Remote Code Execution

A critical vulnerability in Fortinet's Security Information and Event Management (SIEM) platform, tracked as CVE-2025-25256, allows unauthenticated remote attackers to [...]
  • News
Posted on January 16, 2026 by Mash

BreachForums Hacking Forum User Database Exposed in Leak

The user database from the latest version of the notorious BreachForums cybercrime marketplace has been leaked online, exposing information for [...]
  • News
Posted on January 12, 2026 by Mash

Unpatched Command Injection Flaw in Old D-Link Routers Under Active Exploit

A critical command injection vulnerability in several legacy D-Link DSL routers is being actively exploited by threat actors. Tracked as [...]
  • News
Posted on January 7, 2026 by Mash

Fake Windows BSOD Screens Used in ClickFix Attacks on Hotels

A new social engineering campaign is targeting the European hospitality sector by using deceptive Blue Screen of Death (BSOD) screens [...]
  • News
Posted on January 7, 2026 by Mash

Threat Actors and Resecurity Dispute Nature of Alleged Cybersecurity Breach

A threat group calling itself "Scattered Lapsus$ Hunters" claims to have successfully breached the cybersecurity firm Resecurity, stealing alleged internal [...]
  • News
Posted on January 5, 2026 by Mash

Kimwolf Botnet Exploits Proxy Networks to Infect Millions of Devices

The Kimwolf botnet has infected over two million devices globally by exploiting a critical vulnerability in residential proxy networks, allowing [...]
  • News
Posted on January 4, 2026 by Mash

Grubhub's Legitimate Subdomain Used in Crypto Multiplication Scam

Scammers have sent fraudulent emails to Grubhub users promising a tenfold return on any Bitcoin sent to a specified wallet. [...]
  • News
Posted on December 29, 2025 by Mash

Typosquatted Windows Activator Domain Distributes Malicious PowerShell Loader

A fraudulent domain masquerading as the popular Microsoft Activation Scripts (MAS) tool is being used to infect users with a [...]
  • News
Posted on December 26, 2025 by Mash

Malicious Loaders Spread via Cracked Software and Hijacked YouTube Channels

Security researchers have identified two distinct campaigns distributing sophisticated malware loaders through deceptive distribution channels. The first leverages cracked software [...]
  • News
Posted on December 21, 2025 by Mash

UEFI Vulnerability in Major Motherboards Allows Pre-OS DMA Attacks

A critical vulnerability in the UEFI firmware of motherboards from ASUS, Gigabyte, MSI, and ASRock allows attackers with physical access [...]
  • News
Posted on December 21, 2025 by Mash

GhostPairing Attack Hijacks WhatsApp Accounts via Device Linking Feature

A new campaign named "GhostPairing" is exploiting WhatsApp's legitimate device-linking feature to hijack user accounts without requiring authentication. Attackers initiate [...]
  • News
Posted on December 20, 2025 by Mash

Cloud Security Competition Awards $320,000 for 11 Zero-Day Exploits

The inaugural Zeroday Cloud hacking competition in London has awarded security researchers a total of $320,000 for uncovering and demonstrating [...]
  • News
Posted on December 19, 2025 by Mash

GhostPoster Campaign Hides Backdoor in Malicious Firefox Extension Logos

A malicious campaign named GhostPoster is concealing JavaScript code within the PNG logo files of over a dozen Firefox extensions. [...]
  • News
Posted on December 17, 2025 by Mash

New SantaStealer Malware-as-a-Service Targets Browser and Crypto Data

A new malware-as-a-service (MaaS) operation named SantaStealer is being marketed on cybercrime forums, promoted for its ability to run in [...]
  • News
Posted on December 16, 2025 by Mash

Unofficial Micropatches Released for Unpatched Windows RasMan Zero-Day

A newly discovered zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan) service allows attackers to crash the critical [...]
  • News
Posted on December 14, 2025 by Mash

VSCode Marketplace Extensions Hid Malware in Fake PNG and Bundled Dependencies

A malicious campaign on the official VSCode Marketplace has been distributing 19 extensions that contain hidden malware within their bundled [...]
  • News
Posted on December 13, 2025 by Mash

DroidLock Android Malware Locks Devices and Steals Screen Patterns for Ransom

A new Android malware named DroidLock is targeting Spanish-speaking users by locking their devices and demanding a ransom. Distributed through [...]
  • News
Posted on December 11, 2025 by Mash

Ransomware Groups Use Shanya Packer Service to Evade Security Software

Multiple prominent ransomware gangs are utilizing a packer-as-a-service platform called Shanya to conceal and deploy malware designed to disable endpoint [...]
  • News
Posted on December 10, 2025 by Mash

Microsoft Eliminates Clean Install Requirement for Windows 11's Smart App Control

Microsoft has removed a significant barrier for its Windows 11-exclusive security feature, Smart App Control, by eliminating the mandatory clean [...]
  • News
Posted on December 9, 2025 by Mash

Cloudflare Outage Triggered by Emergency Patch for React Vulnerability

Cloudflare experienced a major global outage today, causing widespread "500 Internal Server Error" messages for many websites. The company has [...]
  • News
Posted on December 6, 2025 by Mash

Posts navigation

Older posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software