Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Threat Actor Eternity Group Actively Selling Malware-As-A-Service LilithBot To Other Hackers

Eternity Project is a marketplace where threat actors can buy various malicious software for their own use, including miners, stealers, [...]
  • News
Posted on October 7, 2022 by Mash

Microsoft SQL Servers Targeted By Maggie Backdoor

According to security researchers, a large number of Microsoft SQL servers are currently targeted by the new backdoor called Maggie. [...]
  • News
Posted on October 7, 2022 by Mash

Microsoft Exchange Server Zero-day Temporary Mitigation Can Be Bypassed, Security Researchers Say

Threat actors have been abusing two Microsoft Exchange zero-days in order to breach its servers and remotely execute the malicious [...]
  • News
  • Exchange
Posted on October 4, 2022 by Mash

Windows 11 22H2 Feature 'File Locksmith' Allows Users To Delete Files In Use

Windows uses File Explorer to work with files, but its functionality is limited, for example, it doesn't allow users to [...]
  • News
  • Windows 11
Posted on October 3, 2022 by Mash

North Korean Hacking Group Lazarus Abuses Dell Driver Bug In BYOVD Attack

North Korean hacking group Lazarus has been using a Windows rootkit called FudModule to abuse a Dell driver vulnerability in [...]
  • News
  • Lazarus
Posted on October 2, 2022 by Mash

"Novel Malware Ecosystem" Threatens VMware ESXi Hypervisors

According to Google's Mandiant threat intelligence division, threat actors are deploying new post-compromise implants in VMware's virtualization software to gain [...]
  • News
Posted on October 1, 2022 by Mash

NullMixer Dropper Infects Windows Devices With Various Malware Families

A new malware dropper NullMixer has been discovered to infect Windows devices with a large variety of malware families, including [...]
  • News
Posted on September 28, 2022 by Mash

New Adware Apps on Google Play Discovered - Totaling Around 13 Million Installations

Security researchers have found 75 adware apps on Google Play and 10 on Apple's App Store, adding to 13 million [...]
  • News
Posted on September 27, 2022 by Mash

Windows 11 22H2 Enhanced Phishing Protection Feature Warns Users When Typing Password in Notepad

One of the new features coming with Windows 11 22H2 is a security feature called Enhanced Phishing Protection. The feature's [...]
  • News
  • Windows 11
Posted on September 25, 2022 by Mash

Popular npm Packages Used By Several Crypto Projects Compromised

Several npm packages published by the decentralized exchange platform dYdX crypto exchange have been compromised. The compromised packages were published [...]
  • News
Posted on September 24, 2022 by Mash

High Severity ManageEngine Vulnerability Actively Used In Exploits

According to The Cybersecurity and Infrastructure Security Agency (CISA), the high severity Java deserialization vulnerability affecting multiple Zoho ManageEngine products [...]
  • News
Posted on September 24, 2022 by Mash

Ongoing Chromeloader Malware Campaign Dropping Various Malware, VMware and Microsoft Warn

According to VMware and Microsoft, an ongoing widespread Chromeloader malware campaign was seen to drop malicious browser extensions and even [...]
  • News
Posted on September 21, 2022 by Mash

Grand Theft Auto 6 Source Code and Gameplay Debug Videos Leaked Due To Rockstar's Slack Server Breach

GTA 6 source code and gameplay videos have been leaked to GTAForums by the threat actor ‘teapotuberhacker’. The RAR archive [...]
  • News
Posted on September 19, 2022 by Mash

Free Decryptor For LockerGoga Ransomware Released By Bitdefender

Romanian cybersecurity company Bitdefender has released a free decryptor for LockerGoga ransomware that victims can use to decrypt their files [...]
  • News
Posted on September 17, 2022 by Mash

Apple Released New Security Updates - Addresses Eight Zero-day Used In Attacks This Year

The new security advisory has been issued by Apple on Monday in which the company addressed the eighth zero-day vulnerability [...]
  • News
Posted on September 13, 2022 by Mash

Threat Actors Actively Employ Intermittent Encryption In Recent Ransomware Attacks

More and more ransomware gangs are employing the new tactic called intermittent encryption which allows faster encryption and fewer chances [...]
  • News
Posted on September 11, 2022 by Mash

Iranian State-Sponsored Hacking Group Nemesis Kitten Encrypts Windows Systems Using BitLocker

According to Microsoft, state-sponsored hacking group DEV-0270 (also known as Nemesis Kitten) is actively abusing recently found vulnerabilities and uses [...]
  • News
Posted on September 9, 2022 by Mash

CodeRat Source Code Leaked On GitHub By Dev

The operation CodeRAT originates from Iran and mostly targets Farsi-speaking software devs with Word documents that include a DDE exploit. [...]
  • News
Posted on September 4, 2022 by Mash

Google Chrome's New Update Fixed Actively Exploited High Severity Zero-Day

In the new Chrome version 105.0.5195.102 Google has addressed a high severity vulnerability that was actively exploited in the wild. [...]
  • News
Posted on September 3, 2022 by Mash

Chile Government Agency Servers Under Attack By Ransomware

According to Chile's national computer security and incident response team (CSIRT) the ransomware attack that started on August 25 has [...]
  • News
Posted on September 2, 2022 by Mash

New Malware Campaign GO#WEBBFUSCATOR Hides In James Webb Telescope Images

According to Securonix security researchers, the recently discovered malware campaign GO#WEBBFUSCATOR spreads through phishing emails, malicious documents, and even James [...]
  • News
Posted on August 31, 2022 by Mash

New Malware Hides From Antivirus Detection By Waiting A Month For An Installation

According to Check Point's report, malware by the developer 'Nitrokod' delays its installation for a month to avoid being detected [...]
  • News
Posted on August 30, 2022 by Mash

Chromium-based Browsers Allow Websites To Write To User's Clipboard

Chromium-based web browsers (including Chrome) allow websites to write anything they want into the user's clipboard without getting permission from [...]
  • News
Posted on August 27, 2022 by Mash

New Russian Malware 'MagicWeb' Allows Hackers To Trick Windows Login

New malware dubbed 'MagicWeb' from the Russian state-sponsored hacking group APT29 (also known as Nobelium, Cozy Bear) has been discovered [...]
  • News
Posted on August 26, 2022 by Mash

Password Management Company LastPass Hacked - Source Code Stolen

Password management company LastPass was hacked two weeks ago, allowing hackers to steal source code and technical information. According to [...]
  • News
Posted on August 26, 2022 by Mash

Fake Chrome Extension 'Internet Download Manager' Has Been On Chrome Web Store For 3 Years

Chrome extension 'Internet Download Manager' has reached 200,000 installs on Chrome Web Store, while sitting on the store since June [...]
  • News
Posted on August 25, 2022 by Mash

Bitcoin ATM Servers Zero-day Exploited to Steal Cryptocurrency

Hackers have managed to abuse the zero-day vulnerability in General Bytes Bitcoin ATM servers to steal the cryptocurrency from the [...]
  • News
Posted on August 21, 2022 by Mash

Online Tool InAppBrowser Checks If In-App Browsers Are at Privacy Risk

The online tool InAppBrowser created by developer Felix Krause allows users to check if their in-app browsers inject privacy-threatening JavaScript [...]
  • News
Posted on August 20, 2022 by Mash

Several Malicious Apps Found on Google Play - Having More Than 2 Million Downloads Combined

Bitdefender cybersecurity researchers have discovered a big number of malicious Android apps on Google Play by employing a real-time behavior-based [...]
  • News
  • Android
Posted on August 19, 2022 by Mash

Apple's Security Update Fixed Two Actively Exploited Zero-days

Apple has released a new Security Update to fix two recently exploited zero-day vulnerabilities. The first vulnerability is tracked as [...]
  • News
Posted on August 18, 2022 by Mash

Lazarus Hacking Group Impersonates Coinbase to Target IT Job Hunters

North Korean hacking group dubbed Lazarus is impersonating Coinbase to bait IT job seekers with fake job offers. Threat actors [...]
  • News
  • Lazarus
Posted on August 18, 2022 by Mash

New Microsoft PowerToys Utility PowerOCR Allows Copying Text From Images

With a new, Microsoft PowerToys utility called PowerOCR users will be able to select and copy the text from the [...]
  • News
  • Microsoft
  •  
  • Windows
Posted on August 18, 2022 by Mash

Ads for Microsoft 365 Appearing in Office 2021

Microsoft is showing Microsoft 365 Family plan ads in Office 2021, offering a discount of over 28$ for a 3-month [...]
  • News
  • Microsoft
Posted on August 13, 2022 by Mash

Ransomware Family GwisinLocker Encrypts Windows and Linux Servers

A threat actor dubbed Gwisin has launched a ransomware GwisinLocker which targets South Korean companies by encrypting Windows and Linux [...]
  • News
Posted on August 9, 2022 by Mash

Twitter Confirms Zero-day Caused a Large Data Leak

Twitter has confirmed that the data of 5.4 million users have been leaked because of the now-patched zero-day vulnerability. The [...]
  • News
Posted on August 6, 2022 by Mash

Windows Defender Command Line Abused by LockBit Hackers to Load CobaltStrike

According to the Sentinel Labs researchers, LockBit ransomware operators have been abusing Microsoft Defender’s command line tool “MpCmdRun.exe” to side-load [...]
  • News
Posted on July 30, 2022 by Mash

Hacking Group Knotweed Abuses Windows and Adobe Zero-days to Deploy Subzero Malware

According to Microsoft, a hacking group Knotweed together with the Austrian spyware vendor DSIRF is targeting European and Central American [...]
  • News
Posted on July 28, 2022 by Mash

New Malicious Android Apps Discovered on Google Play - Installed Almost 10 Million Times

A big number of malicious Android apps have been recently found by Dr. Web's antivirus team on Google Play Store, [...]
  • News
Posted on July 28, 2022 by Mash

Hackers Behind Qbot Malware Using Windows Calculator to Side-load Malware

Qbot, also known as Qakbot is a Windows malware strain that evolved from a banking trojan into a malware dropper [...]
  • News
Posted on July 26, 2022 by Mash

Spyware Vendor Candiru Abused Chrome Zero-day to Spy on High-Interest Targets

The Israeli spyware vendor Candiru was abusing Chrome zero-day by using DevilsTongue spyware to collect data on high-interest targets. The [...]
  • News
Posted on July 22, 2022 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software