Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Procolored Shipped Malware-Infested Printer Software for Over Six Months

For at least half a year, Procolored unknowingly distributed malware with its printer software, including a remote access trojan (XRedRAT) [...]
  • News
Posted on May 18, 2025 by Mash

Chrome to Auto-Drop Admin Privileges at Launch for Enhanced Security

Google is implementing a security update in Chromium that prevents Chrome from running with administrator rights on Windows, following Microsoft [...]
  • News
Posted on May 16, 2025 by Mash

Ivanti Patches Critical Authentication Bypass in Neurons for ITSM

Ivanti has issued fixes for a severe authentication bypass flaw (CVE-2025-22462) in its Neurons for ITSM platform that could let [...]
  • News
Posted on May 14, 2025 by Mash

ASUS DriverHub Bug Allowed Malicious Websites to Execute Admin Commands

A serious vulnerability in ASUS's DriverHub tool let malicious websites execute commands with administrative privileges on affected devices. Discovered by [...]
  • News
Posted on May 13, 2025 by Mash

Fake CAPTCHA on iClicker Site Used to Spread Malware in Social Engineering Attack

The iClicker website, widely used by colleges across the U.S., was compromised in mid-April 2025 in a ClickFix-style attack that [...]
  • News
Posted on May 12, 2025 by Mash

Samsung MagicINFO Server Bug Under Active Exploitation for Remote Code Attacks

Cybercriminals are now actively exploiting a critical remote code execution (RCE) flaw in Samsung’s MagicINFO 9 Server, a platform widely [...]
  • News
Posted on May 11, 2025 by Mash

Ransomware Actors Exploit Kickidler Monitoring Tool for Stealthy Credential Theft and Recon

Ransomware groups like Qilin and Hunters International are misusing the legitimate Kickidler employee monitoring software to secretly observe victim behavior, [...]
  • News
Posted on May 11, 2025 by Mash

Play Ransomware Gang Leveraged Windows Zero-Day for Privilege Escalation Attacks

The Play ransomware group has been exploiting a Windows Common Log File System vulnerability (CVE-2025-29824) in zero-day attacks to escalate [...]
  • News
Posted on May 11, 2025 by Mash

StealC Malware Upgraded with Enhanced Data Theft and Stealth Features

The developers behind StealC malware have launched version 2, introducing advanced data theft capabilities and stealth improvements. Initially released in [...]
  • News
Posted on May 6, 2025 by Mash

Microsoft Retires Authenticator Autofill, Urges Users to Switch to Edge

Microsoft is phasing out the password autofill and storage feature in its Authenticator app, with full deprecation set for August [...]
  • News
Posted on May 5, 2025 by Mash

Microsoft Resolves Gmail Spam Misclassification in Exchange Online

Microsoft has addressed a problem in Exchange Online where emails from Gmail were wrongly flagged as spam due to a [...]
  • News
Posted on May 4, 2025 by Mash

Malicious Python Packages Exploit Gmail and WebSockets to Gain Remote Access

Security researchers at Socket uncovered seven harmful Python packages on PyPI that abused Gmail's SMTP servers and WebSockets to enable [...]
  • News
Posted on May 3, 2025 by Mash

Malicious Uyghur Text Editor Used in Targeted Attack Against Diaspora Activists

Citizen Lab researchers have uncovered a phishing and supply chain attack aimed at members of the Uyghur community living outside [...]
  • News
Posted on April 29, 2025 by Mash

Coinbase Resolves Logging Bug That Caused False 2FA Breach Alarms

Coinbase recently corrected a bug in its account activity logs that had alarmed users into thinking their accounts were compromised. [...]
  • News
Posted on April 29, 2025 by Mash

SAP Issues Emergency Patch for Critical NetWeaver Vulnerability Amid Active Exploits

SAP has urgently released patches for a critical zero-day vulnerability (CVE-2025-31324) in NetWeaver Visual Composer that attackers have exploited to [...]
  • News
Posted on April 27, 2025 by Mash

Cookie-Bite Attack Uses Chrome Extension to Hijack Session Tokens and Bypass MFA

Security researchers from Varonis have unveiled a proof-of-concept attack named "Cookie-Bite," which leverages a malicious Chrome extension to steal session [...]
  • News
Posted on April 23, 2025 by Mash

Hackers Exploit Google OAuth to Deliver Authentic-Looking Phishing Emails in DKIM Replay Scheme

Cybercriminals have discovered a way to send phishing emails that appear to come directly from Google by exploiting a flaw [...]
  • News
Posted on April 22, 2025 by Mash

Interlock Ransomware Leverages Fake IT Tools in Sophisticated ClickFix Attacks

The Interlock ransomware group has adopted ClickFix-style attacks that trick users into running malicious PowerShell commands under the guise of [...]
  • News
Posted on April 20, 2025 by Mash

Windows NTLM Hash Leak Bug Actively Exploited in Government-Targeted Phishing Campaigns

A Windows flaw (CVE-2025-24054) allowing NTLM hash leakage through .library-ms files is now being actively used in phishing attacks against [...]
  • News
Posted on April 19, 2025 by Mash

Apple Patches Two New Zero-Days Used in Advanced iPhone Attacks

Apple has released urgent security updates to fix two newly discovered zero-day vulnerabilities that were exploited in highly targeted iPhone [...]
  • News
Posted on April 18, 2025 by Mash

Russian APT29 Unleashes Stealthy GrapeLoader in Phishing Attacks on European Embassies

Russian-backed hacking group Midnight Blizzard (also known as APT29 or Cozy Bear) is behind a spear-phishing campaign targeting European diplomatic [...]
  • News
Posted on April 17, 2025 by Mash

Crypto-Stealing Malware Found Preloaded on Budget Android Phones

Researchers from Doctor Web have uncovered a malware campaign in which low-cost Android phones come pre-infected with spyware designed to [...]
  • News
Posted on April 16, 2025 by Mash

Tycoon2FA Upgrades Make Microsoft 365 Phishing Attacks Harder to Detect

The Tycoon2FA phishing-as-a-service platform has received updates that enhance its ability to evade detection while targeting Microsoft 365 and Gmail [...]
  • News
Posted on April 14, 2025 by Mash

OttoKit Plugin Flaw Exploited Within Hours of Public Disclosure

Hackers began taking advantage of a serious authentication bypass vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin just hours after [...]
  • News
Posted on April 12, 2025 by Mash

Windows Hello Login Problems Triggered by April 2025 Update

Microsoft has acknowledged that the April 2025 cumulative update (KB5055523) may cause Windows Hello to malfunction on certain devices, particularly [...]
  • News
Posted on April 10, 2025 by Mash

Malicious VSCode Add-ons Used to Secretly Mine Cryptocurrency on Windows

Nine fake Visual Studio Code extensions were found on Microsoft's VSCode Marketplace, posing as legitimate tools while secretly infecting users [...]
  • News
Posted on April 9, 2025 by Mash

Hackers Use Hidden WordPress Plugins to Secretly Run Malicious Code

Cybercriminals are increasingly abusing WordPress's mu-plugins (Must-Use Plugins) directory to stealthily execute harmful code on every page without being easily [...]
  • News
Posted on April 7, 2025 by Mash

New WinRAR Vulnerability Allows Attackers to Bypass Windows Security Prompts

A recently discovered flaw in WinRAR, identified as CVE-2025-31334, enables attackers to bypass the Windows "Mark of the Web" (MotW) [...]
  • News
Posted on April 6, 2025 by Mash

Cybersecurity Agencies Urge Action Against Fast Flux DNS Techniques

CISA, alongside the FBI, NSA, and international partners, is warning about the persistent threat of Fast Flux, a DNS evasion [...]
  • News
Posted on April 4, 2025 by Mash

Mozilla Urges Windows Users to Update Firefox Due to Critical Sandbox Escape Flaw

Mozilla has rolled out Firefox 136.0.4 to fix a serious security vulnerability (CVE-2025-2857) that allows attackers to break out of [...]
  • News
Posted on March 29, 2025 by Mash

New Windows Zero-Day Exposes NTLM Hashes, Gets Temporary Fix

A newly discovered Windows zero-day vulnerability allows remote attackers to steal NTLM hashes by tricking users into simply viewing malicious [...]
  • How-to
Posted on March 27, 2025 by Mash

VanHelsing Ransomware Targets Multiple Platforms with Advanced Stealth

A new ransomware operation, VanHelsing, has surfaced as a multi-platform RaaS (Ransomware-as-a-Service), attacking Windows, Linux, BSD, ARM, and ESXi systems. [...]
  • News
Posted on March 26, 2025 by Mash

FBI Confirms Fake File Converters Are Spreading Malware

The FBI warns that cybercriminals are using fake online document converters to distribute malware, steal sensitive data, and even launch [...]
  • News
Posted on March 25, 2025 by Mash

Hackers Exploit Microsoft Trusted Signing to Sign Malware

Cybercriminals are misusing Microsoft’s Trusted Signing service to code-sign malware using short-lived three-day certificates, making malicious files appear legitimate. Code-signing [...]
  • News
Posted on March 24, 2025 by Mash

Hackers Now Exploiting Critical Cisco Smart Licensing Utility Flaws

Cybercriminals have begun attacking unpatched Cisco Smart Licensing Utility (CSLU) instances by exploiting a vulnerability that provides access to a [...]
  • News
Posted on March 22, 2025 by Mash

DollyWay Malware Campaign Hijacks 20,000 WordPress Sites for Redirection Scams

Since 2016, the DollyWay malware campaign has compromised over 20,000 WordPress sites worldwide, redirecting visitors to fraudulent pages promoting scams [...]
  • News
Posted on March 20, 2025 by Mash

Windows Zero-Day Exploited by State Hackers Since 2017, Microsoft Yet to Patch

At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been using a newly discovered Windows [...]
  • News
  • Windows
Posted on March 19, 2025 by Mash

March Windows Update Accidentally Removes Copilot from Some Systems

Microsoft has confirmed that the March 2025 cumulative updates for Windows 10 and Windows 11 mistakenly uninstall the Copilot digital [...]
  • News
Posted on March 19, 2025 by Mash

Fake Adobe and DocuSign OAuth Apps Target Microsoft 365 Users

Cybercriminals are using deceptive Microsoft OAuth apps disguised as Adobe and DocuSign tools to spread malware and steal Microsoft 365 [...]
  • News
Posted on March 18, 2025 by Mash

Microsoft Apologizes for Wrongly Removing Popular VSCode Extensions

Microsoft has restored the ‘Material Theme – Free’ and ‘Material Theme Icons – Free’ extensions on the Visual Studio Marketplace [...]
  • News
Posted on March 14, 2025 by Mash

Posts navigation

Older posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software