Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

HelloKitty Ransomware Operator Rebranding, Releasing Data And Decryption Keys From Previous Campaigns

The overseer behind the HelloKitty ransomware endeavor has declared a rebranding, now known as 'HelloGookie.' They've also disclosed passwords for [...]
  • News
Posted on April 21, 2024 by Mash

Fresh Android Malware SoumniBot Uses Rare Techniques To Abuse Android's Parsing Process

A recently identified Android banking malware dubbed 'SoumniBot' has adopted a unique obfuscation tactic, capitalizing on vulnerabilities within the Android [...]
  • News
Posted on April 19, 2024 by Mash

Firebird Developers Arrested By Australian Federal Police And FBI

A collaborative effort between the Australian Federal Police (AFP) and the FBI has resulted in the apprehension and prosecution of [...]
  • News
Posted on April 15, 2024 by Mash

Two Actively Abused Zero-days Addressed By Microsoft

During April's Patch Tuesday, Microsoft addressed two zero-day vulnerabilities that were actively exploited, initially overlooked by the company. The first [...]
  • News
Posted on April 11, 2024 by Mash

PhaaS Service Darcula Targets iPhone And Android Users In A Credentials-Stealing Campaign

Introducing 'Darcula', a novel phishing-as-a-service (PhaaS) platform utilizing a network of 20,000 domains to mimic reputable brands and pilfer user [...]
  • News
Posted on March 29, 2024 by Mash

StrelaStealer Campaign Targets Outlook Users In A Credentials-Stealing Attempt

A widespread StrelaStealer malware campaign has affected organizations in the United States and Europe, aiming to pilfer email credentials. Initially [...]
  • News
Posted on March 26, 2024 by Mash

Saflok RFID Vulnerabilities Allow Attackers Enter Hotel Rooms

Today, researchers revealed vulnerabilities affecting 3 million Saflok RFID locks worldwide, enabling easy door unlocking with forged keycards. Discovered by [...]
  • News
Posted on March 23, 2024 by Mash

Millions Of Plaintext Passwords Found In The Public Web Due To Incorrectly Configured Firebase Instances

Three cybersecurity researchers uncovered nearly 19 million plaintext passwords exposed on the public internet due to misconfigured Firebase instances, a [...]
  • News
Posted on March 21, 2024 by Mash

ShadowSyndicate Hackers Abuse Aiohttp Python Vulnerability To Find Targets

The ransomware group 'ShadowSyndicate' targeted servers vulnerable to CVE-2024-23334, a directory traversal flaw in the aiohttp Python library. Aiohttp, crucial [...]
  • News
Posted on March 18, 2024 by Mash

DarkGate Malware Distribution Campaigns Abusing Windows Defender SmartScreen Vulnerability

DarkGate malware exploits a recently patched Windows Defender SmartScreen vulnerability to install fake software, bypassing security checks. The flaw, CVE-2024-21412, [...]
  • News
Posted on March 15, 2024 by Mash

New Cumulative Windows Update Has Installation Problems

The cumulative update KB5035849, launched on today's Patch Tuesday, encounters installation issues on Windows 10 and Windows Server setups, reporting [...]
  • News
Posted on March 14, 2024 by Mash

WordPress Popup Builder Plugin Vulnerability Massively Exploited - Over 3,300 Websites Infected

Hackers are exploiting a vulnerability in outdated versions of the Popup Builder plugin on WordPress sites, infecting over 3,300 websites [...]
  • News
Posted on March 12, 2024 by Mash

WordPress Hacking Campaign Leads To Attackers Getting Passwords For Other Websites

Hackers are launching large-scale attacks on WordPress sites, injecting scripts to force visitors' browsers to brute-force passwords on other platforms. [...]
  • News
Posted on March 9, 2024 by Mash

Hackering Group TA577 Stealing NTLM Authentication Hashes, Allowing For Privleges Escalation

TA577, a hacking group, has shifted tactics to using phishing emails for NTLM authentication hash theft, enabling account hijacks. Formerly [...]
  • News
Posted on March 6, 2024 by Mash

Actively Exploited Windows Kernel Vulnerability Addressed By Microsoft

In February, Microsoft addressed a critical Windows Kernel privilege escalation vulnerability, CVE-2024-21338, six months after it was reported as actively [...]
  • News
Posted on March 4, 2024 by Mash

Anycubic 3D Printers Hacked To Bring Attention To Critical Vulnerability

Numerous reports from Anycubic customers online suggest that their 3D printers have been hacked, highlighting a vulnerability. The perpetrator uploaded [...]
  • News
Posted on March 1, 2024 by Mash

14-year-old Discontinued CMS Editor Exploited To Compromise Education And Government Entities Worldwide

14-year-old discontinued CMS editor exploited by threat actors to compromise education and government entities worldwide, poisoning search results with malicious [...]
  • News
Posted on February 28, 2024 by Mash

Avast Found Guilty Of Selling Users' Browsing Data By US Federal Trade Comission, Have To Pay $16.5 Million

The FTC has mandated Avast to pay $16.5 million and discontinue the sale or licensing of users' web browsing data [...]
  • News
Posted on February 25, 2024 by Mash

Hackers Use Migo Malware To Mine Crypto Via Server Hijacking

Security researchers have uncovered a fresh campaign targeting Redis servers on Linux, employing a malware named 'Migo' for cryptocurrency mining. [...]
  • News
Posted on February 22, 2024 by Mash

Supposedly Fixed Windows Metadata Feature Still Works Incosistently For Different Users

Microsoft has reportedly fixed Windows Metadata connection issues that persistently trouble users, hindering printer and hardware management. When new hardware [...]
  • News
Posted on February 19, 2024 by Mash

Five Critical Severity RCE Vulnerabilities In Access Rights Manager Patched By SolarWinds

SolarWinds patched five RCE vulnerabilities in Access Rights Manager (ARM), including three critical flaws. These issues, like path traversal weaknesses [...]
  • News
Posted on February 18, 2024 by Mash

Critical Exchange Server Vulnerability Fixed In Recent Security Patch Was Already Exploited, Warns Microsoft

Microsoft has cautioned about a critical flaw in Exchange Server, CVE-2024-21410, exploited before this month's Patch Tuesday. This vulnerability enables [...]
  • News
Posted on February 16, 2024 by Mash

Hackers Exploit Roundcube Email Servers Vulnerability In XSS Cyberattacks To Access Restricted Data, Warns CISA

CISA warns of an actively exploited vulnerability (CVE-2023-43770) in Roundcube email servers, allowing attackers to access restricted information via malicious [...]
  • News
Posted on February 14, 2024 by Mash

New Rust-based MacOS Malware Spreading By Disguising As Visual Studio Update

A freshly discovered macOS malware, built on Rust, is circulating disguised as a Visual Studio update. Its purpose is to [...]
  • News
Posted on February 11, 2024 by Mash

Dutch Ministry Of Defence Breached By Chinese Hackers

A Chinese cyber-espionage group infiltrated the Dutch Ministry of Defence last year, planting malware on devices, as per the Dutch [...]
  • News
Posted on February 8, 2024 by Mash

Google Actively Testing Cookie Phaseout Test, Avaliable For Some Users

Google is currently testing the removal of third-party cookies on Chrome, impacting around 1% of users, equivalent to roughly 30 [...]
  • News
Posted on February 6, 2024 by Mash

AnyDesk Production Servers Breached In Recent Cyberattack

AnyDesk has officially confirmed that it fell victim to a recent cyberattack, resulting in unauthorized access to the company's production [...]
  • News
Posted on February 4, 2024 by Mash

USB Malware Payloads Spreading By Legitimate Online Platforms And Websites

A financially motivated threat actor, utilizing USB devices for initial infection, is exploiting legitimate online platforms such as GitHub, Vimeo, [...]
  • News
Posted on February 2, 2024 by Mash

Threat Actor Blackwood Using NSPX30 Malware In Cyberespionage Campaigns

The elusive threat actor 'Blackwood' is employing the advanced NSPX30 malware in cyberespionage campaigns targeting entities in China, Japan, and [...]
  • News
Posted on January 27, 2024 by Mash

Kasseika Ransomware Uses BYOVD Technique, Shutting Down Antiviruses By Abusing Martini Driver

A recently revealed ransomware operation called 'Kasseika' has adopted Bring Your Own Vulnerable Driver (BYOVD) tactics to bypass antivirus software [...]
  • News
Posted on January 24, 2024 by Mash

Apple's New Security Update Addresses Actively Exploited Zero-day Vulnerability

Apple has released security updates to address the first zero-day vulnerability of the year, impacting iPhones, Macs, and Apple TVs. [...]
  • News
Posted on January 24, 2024 by Mash

Hackers Steal Facebook Users' Credentials Using "I can't believe he is gone" Posts

A widespread Facebook phishing scheme, featuring messages like "I can't believe he is gone. I'm gonna miss him so much," [...]
  • News
Posted on January 23, 2024 by Mash

Microsoft Email Accounts Breached By Russian Hacking Group, Some Corporate Emails Stolen

Microsoft disclosed that some of its corporate email accounts were breached and data stolen by a Russian state-sponsored hacking group [...]
  • News
Posted on January 21, 2024 by Mash

Scrypts That Check Shutdown.Log System File On Apple Devices Help In Detecting Possible Infection

Security experts have identified that compromised Apple mobile devices may harbor prominent spyware like Pegasus, Reign, and Predator. A thorough [...]
  • News
Posted on January 19, 2024 by Mash

GitLab Addresses Critical Zero-Click Vulnerabilities With Security Update

GitLab released critical security updates for both its Community and Enterprise Edition, addressing a severe authentication flaw (CVE-2023-7028) that allows [...]
  • News
Posted on January 14, 2024 by Mash

New Approah To DLL Search Order Hijacking Allows Bypassing Windows 10 and Windows 11 Protection Mechanisms

Security researchers have uncovered a novel variant of DLL search order hijacking, posing a threat to Microsoft Windows 10 and [...]
  • News
Posted on January 3, 2024 by Mash

Three Malicious Chrome VPN Extensions Discovered - Totaling 1.5 Million Downloads

Three fake Chrome VPN extensions, disguised as legitimate tools, were downloaded 1.5 million times. These malicious extensions, discovered by ReasonLabs, [...]
  • News
Posted on December 24, 2023 by Mash

Iranian Hacking Group Targeting Defense Contractors With FalseFont Backdoor

Microsoft has identified APT33, an Iranian cyber-espionage group also known as Peach Sandstorm, HOLMIUM, or Refined Kitten, employing the recently [...]
  • News
Posted on December 22, 2023 by Mash

Several Vulnerabilities In Preforce Helix Core Server Discovered, One Considered Critical

One critical and three other vulnerabilities were found in the widely utilized Perforce Helix Core Server, a source code management [...]
  • News
Posted on December 20, 2023 by Mash

Newly Developed Attack AutoSpill Steals Android's Users' Account Credentials

Security researchers have introduced a new attack named AutoSpill to pilfer Android account credentials during autofill operations. Tests by the [...]
  • News
Posted on December 11, 2023 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software