Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

RomCom RAT Malware Disguises As Known Software Brands For Distribution - Including SolarWinds and KeePass

RomCom's new campaign involves creating fake websites disguised as known software brands (like SolarWinds NPM and KeePass) to distribute RATs [...]
  • News
Posted on November 4, 2022 by Mash

Hackers Push SocGholish Malware Through A Large Number Of Newspapers Sites In A Supply Chain Attack

A big number of newspaper sites belonging to an undisclosed media company have been compromised to push the SocGholish JavaScript [...]
  • News
Posted on November 3, 2022 by Mash

130 Code Repositories With Dropbox Data Stolen

Dropbox disclosed the security breach which resulted in attackers stealing 130 GitHub code repositories with Dropbox data. Dropbox stated that [...]
  • News
Posted on November 2, 2022 by Mash

Microsoft's Optimizer PC Manager Helps Users Clean Their Systems

Previously Windows never provided users a way to clean their registry entries and folders for all apps, which is why [...]
  • News
  • Microsoft
  •  
  • Windows
Posted on November 1, 2022 by Mash

Microsoft Releases Official Workaround For Outlook Login Issues

Recently Outlook users who already added their accounts to Outlook profiles and those who are trying to sign in using [...]
  • News
Posted on November 23, 2022 by Mash

Cranefly Hackers Control Malware via Microsoft IIS Web Server Logs

The Cranefly group also known as UNC3524 has been seen to use a unique method of controlling their malware - [...]
  • News
Posted on October 29, 2022 by Mash

Recent "Out Of Bounds" Zero-day Affecting iPads, iPhones Fixed by Apple

A new security update released by Apple addresses recent zero-day (CVE-2022-42827) that affects iPhones and iPads and was used in [...]
  • News
  • Apple
Posted on October 29, 2022 by Mash

New Apple's Security Update Addresses Another Actively Exploited Zero-day Used Against iPhones, iPads

Apple's new security advisory states that the ninth zero-day used in attacks against iPhones since the start of the year [...]
  • News
Posted on October 26, 2022 by Mash

Windows Zero-day Allows Attackers to Bypass Security Warnings Using Malicious JavaScript Files

Threat actors have been seen to abuse Windows zero-day which allows malicious JavaScript Files to bypass Mark-of-the-Web security warnings. Mark-of-the-Web [...]
  • News
Posted on October 23, 2022 by Mash

Critical VMware Vulnerability Exploited To Drop Miners And Ransomware

According to security researchers, hackers are still exploiting the critical VMware vulnerability (CVE-2022-22954) that allows them to drop various malware [...]
  • News
Posted on October 23, 2022 by Mash

Firefox Update Brings PDF Editing Feature

The latest Firefox version brought a new feature that allows the convenient editing of PDF files. The feature allows users [...]
  • News
Posted on October 21, 2022 by Mash

Threat Actor Selling UEFI BootKit BlackLotus On Hacking Forums

The threat actor is supposedly selling a brand new UEFI bootKit named BlackLotus on hacking forums, which is commonly linked [...]
  • News
Posted on October 18, 2022 by Mash

Ducktail Phishing Campaign Steals Facebook Accounts Using PHP Malware

Ducktail phishing campaign, linked to Vietnamese hackers, is actively stealing Facebook accounts, cryptocurrency wallets, and browser data using new PHP [...]
  • News
Posted on October 17, 2022 by Mash

Dutch National Police Managed To Get 155 DeadBolt Ransomware Decryption Keys

The Dutch National Police, in collaboration with cybersecurity firm Responders.NU got 155 decryption keys from the DeadBolt ransomware gang by [...]
  • News
Posted on October 16, 2022 by Mash

Unofficial Android WhatsApp App Steals Keys For Users Accounts

An unofficial Android version of WhatsApp called 'YoWhatsApp' has been discovered to steal access keys for users' accounts. YoWhatsApp has [...]
  • News
Posted on October 14, 2022 by Mash

IcedID Phishing Campaign Improves Its Delivery Tactics

According to security researchers, IcedID creators have been improving and diversifying the delivery tactics of their phishing campaigns. IcedID is [...]
  • News
Posted on October 11, 2022 by Mash

Intel Confirms Alder Lake UEFI BIOS Source Code Leak

Last Friday an anonymous Twitter account by the nickname 'freak' posted links that led to Intel's 12th generation processor (known [...]
  • News
  • Intel
Posted on October 10, 2022 by Mash

Installing Windows 11 22H2 Update Causes Significant Perfomance Hit, Microsoft Confirmed

Microsoft has confirmed a known issue that causes performance reduction when copying large files over SMB after installing the Windows [...]
  • News
  • Windows 11
Posted on October 8, 2022 by Mash

Threat Actor Eternity Group Actively Selling Malware-As-A-Service LilithBot To Other Hackers

Eternity Project is a marketplace where threat actors can buy various malicious software for their own use, including miners, stealers, [...]
  • News
Posted on October 7, 2022 by Mash

Microsoft SQL Servers Targeted By Maggie Backdoor

According to security researchers, a large number of Microsoft SQL servers are currently targeted by the new backdoor called Maggie. [...]
  • News
Posted on October 7, 2022 by Mash

Microsoft Exchange Server Zero-day Temporary Mitigation Can Be Bypassed, Security Researchers Say

Threat actors have been abusing two Microsoft Exchange zero-days in order to breach its servers and remotely execute the malicious [...]
  • News
  • Exchange
Posted on October 4, 2022 by Mash

Windows 11 22H2 Feature 'File Locksmith' Allows Users To Delete Files In Use

Windows uses File Explorer to work with files, but its functionality is limited, for example, it doesn't allow users to [...]
  • News
  • Windows 11
Posted on October 3, 2022 by Mash

North Korean Hacking Group Lazarus Abuses Dell Driver Bug In BYOVD Attack

North Korean hacking group Lazarus has been using a Windows rootkit called FudModule to abuse a Dell driver vulnerability in [...]
  • News
  • Lazarus
Posted on October 2, 2022 by Mash

"Novel Malware Ecosystem" Threatens VMware ESXi Hypervisors

According to Google's Mandiant threat intelligence division, threat actors are deploying new post-compromise implants in VMware's virtualization software to gain [...]
  • News
Posted on October 1, 2022 by Mash

NullMixer Dropper Infects Windows Devices With Various Malware Families

A new malware dropper NullMixer has been discovered to infect Windows devices with a large variety of malware families, including [...]
  • News
Posted on September 28, 2022 by Mash

New Adware Apps on Google Play Discovered - Totaling Around 13 Million Installations

Security researchers have found 75 adware apps on Google Play and 10 on Apple's App Store, adding to 13 million [...]
  • News
Posted on September 27, 2022 by Mash

Windows 11 22H2 Enhanced Phishing Protection Feature Warns Users When Typing Password in Notepad

One of the new features coming with Windows 11 22H2 is a security feature called Enhanced Phishing Protection. The feature's [...]
  • News
  • Windows 11
Posted on September 25, 2022 by Mash

Popular npm Packages Used By Several Crypto Projects Compromised

Several npm packages published by the decentralized exchange platform dYdX crypto exchange have been compromised. The compromised packages were published [...]
  • News
Posted on September 24, 2022 by Mash

High Severity ManageEngine Vulnerability Actively Used In Exploits

According to The Cybersecurity and Infrastructure Security Agency (CISA), the high severity Java deserialization vulnerability affecting multiple Zoho ManageEngine products [...]
  • News
Posted on September 24, 2022 by Mash

Ongoing Chromeloader Malware Campaign Dropping Various Malware, VMware and Microsoft Warn

According to VMware and Microsoft, an ongoing widespread Chromeloader malware campaign was seen to drop malicious browser extensions and even [...]
  • News
Posted on September 21, 2022 by Mash

Grand Theft Auto 6 Source Code and Gameplay Debug Videos Leaked Due To Rockstar's Slack Server Breach

GTA 6 source code and gameplay videos have been leaked to GTAForums by the threat actor ‘teapotuberhacker’. The RAR archive [...]
  • News
Posted on September 19, 2022 by Mash

Free Decryptor For LockerGoga Ransomware Released By Bitdefender

Romanian cybersecurity company Bitdefender has released a free decryptor for LockerGoga ransomware that victims can use to decrypt their files [...]
  • News
Posted on September 17, 2022 by Mash

Apple Released New Security Updates - Addresses Eight Zero-day Used In Attacks This Year

The new security advisory has been issued by Apple on Monday in which the company addressed the eighth zero-day vulnerability [...]
  • News
Posted on September 13, 2022 by Mash

Threat Actors Actively Employ Intermittent Encryption In Recent Ransomware Attacks

More and more ransomware gangs are employing the new tactic called intermittent encryption which allows faster encryption and fewer chances [...]
  • News
Posted on September 11, 2022 by Mash

Iranian State-Sponsored Hacking Group Nemesis Kitten Encrypts Windows Systems Using BitLocker

According to Microsoft, state-sponsored hacking group DEV-0270 (also known as Nemesis Kitten) is actively abusing recently found vulnerabilities and uses [...]
  • News
Posted on September 9, 2022 by Mash

CodeRat Source Code Leaked On GitHub By Dev

The operation CodeRAT originates from Iran and mostly targets Farsi-speaking software devs with Word documents that include a DDE exploit. [...]
  • News
Posted on September 4, 2022 by Mash

Google Chrome's New Update Fixed Actively Exploited High Severity Zero-Day

In the new Chrome version 105.0.5195.102 Google has addressed a high severity vulnerability that was actively exploited in the wild. [...]
  • News
Posted on September 3, 2022 by Mash

Chile Government Agency Servers Under Attack By Ransomware

According to Chile's national computer security and incident response team (CSIRT) the ransomware attack that started on August 25 has [...]
  • News
Posted on September 2, 2022 by Mash

New Malware Campaign GO#WEBBFUSCATOR Hides In James Webb Telescope Images

According to Securonix security researchers, the recently discovered malware campaign GO#WEBBFUSCATOR spreads through phishing emails, malicious documents, and even James [...]
  • News
Posted on August 31, 2022 by Mash

New Malware Hides From Antivirus Detection By Waiting A Month For An Installation

According to Check Point's report, malware by the developer 'Nitrokod' delays its installation for a month to avoid being detected [...]
  • News
Posted on August 30, 2022 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software