Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Chromium-based Browsers Allow Websites To Write To User's Clipboard

Chromium-based web browsers (including Chrome) allow websites to write anything they want into the user's clipboard without getting permission from [...]
  • News
Posted on August 27, 2022 by Mash

New Russian Malware 'MagicWeb' Allows Hackers To Trick Windows Login

New malware dubbed 'MagicWeb' from the Russian state-sponsored hacking group APT29 (also known as Nobelium, Cozy Bear) has been discovered [...]
  • News
Posted on August 26, 2022 by Mash

Password Management Company LastPass Hacked - Source Code Stolen

Password management company LastPass was hacked two weeks ago, allowing hackers to steal source code and technical information. According to [...]
  • News
Posted on August 26, 2022 by Mash

Fake Chrome Extension 'Internet Download Manager' Has Been On Chrome Web Store For 3 Years

Chrome extension 'Internet Download Manager' has reached 200,000 installs on Chrome Web Store, while sitting on the store since June [...]
  • News
Posted on August 25, 2022 by Mash

Bitcoin ATM Servers Zero-day Exploited to Steal Cryptocurrency

Hackers have managed to abuse the zero-day vulnerability in General Bytes Bitcoin ATM servers to steal the cryptocurrency from the [...]
  • News
Posted on August 21, 2022 by Mash

Online Tool InAppBrowser Checks If In-App Browsers Are at Privacy Risk

The online tool InAppBrowser created by developer Felix Krause allows users to check if their in-app browsers inject privacy-threatening JavaScript [...]
  • News
Posted on August 20, 2022 by Mash

Several Malicious Apps Found on Google Play - Having More Than 2 Million Downloads Combined

Bitdefender cybersecurity researchers have discovered a big number of malicious Android apps on Google Play by employing a real-time behavior-based [...]
  • News
  • Android
Posted on August 19, 2022 by Mash

Apple's Security Update Fixed Two Actively Exploited Zero-days

Apple has released a new Security Update to fix two recently exploited zero-day vulnerabilities. The first vulnerability is tracked as [...]
  • News
Posted on August 18, 2022 by Mash

Lazarus Hacking Group Impersonates Coinbase to Target IT Job Hunters

North Korean hacking group dubbed Lazarus is impersonating Coinbase to bait IT job seekers with fake job offers. Threat actors [...]
  • News
  • Lazarus
Posted on August 18, 2022 by Mash

New Microsoft PowerToys Utility PowerOCR Allows Copying Text From Images

With a new, Microsoft PowerToys utility called PowerOCR users will be able to select and copy the text from the [...]
  • News
  • Microsoft
  •  
  • Windows
Posted on August 18, 2022 by Mash

Ads for Microsoft 365 Appearing in Office 2021

Microsoft is showing Microsoft 365 Family plan ads in Office 2021, offering a discount of over 28$ for a 3-month [...]
  • News
  • Microsoft
Posted on August 13, 2022 by Mash

Ransomware Family GwisinLocker Encrypts Windows and Linux Servers

A threat actor dubbed Gwisin has launched a ransomware GwisinLocker which targets South Korean companies by encrypting Windows and Linux [...]
  • News
Posted on August 9, 2022 by Mash

Twitter Confirms Zero-day Caused a Large Data Leak

Twitter has confirmed that the data of 5.4 million users have been leaked because of the now-patched zero-day vulnerability. The [...]
  • News
Posted on August 6, 2022 by Mash

Windows Defender Command Line Abused by LockBit Hackers to Load CobaltStrike

According to the Sentinel Labs researchers, LockBit ransomware operators have been abusing Microsoft Defender’s command line tool “MpCmdRun.exe” to side-load [...]
  • News
Posted on July 30, 2022 by Mash

Hacking Group Knotweed Abuses Windows and Adobe Zero-days to Deploy Subzero Malware

According to Microsoft, a hacking group Knotweed together with the Austrian spyware vendor DSIRF is targeting European and Central American [...]
  • News
Posted on July 28, 2022 by Mash

New Malicious Android Apps Discovered on Google Play - Installed Almost 10 Million Times

A big number of malicious Android apps have been recently found by Dr. Web's antivirus team on Google Play Store, [...]
  • News
Posted on July 28, 2022 by Mash

Hackers Behind Qbot Malware Using Windows Calculator to Side-load Malware

Qbot, also known as Qakbot is a Windows malware strain that evolved from a banking trojan into a malware dropper [...]
  • News
Posted on July 26, 2022 by Mash

Spyware Vendor Candiru Abused Chrome Zero-day to Spy on High-Interest Targets

The Israeli spyware vendor Candiru was abusing Chrome zero-day by using DevilsTongue spyware to collect data on high-interest targets. The [...]
  • News
Posted on July 22, 2022 by Mash

New Ransomware Family Luna Encrypts Various Systems

A recently discovered ransomware family dubbed Luna has been seen to encrypt devices running several operating systems, including Windows, Linux, [...]
  • News
Posted on July 22, 2022 by Mash

HolyGhost Ransomware Campaign Linked With North Korean Hacking Group

Ransomware operation HolyGhost has been active for more than a year, mainly targeting small businesses. According to Microsoft Threat Intelligence [...]
  • News
Posted on July 16, 2022 by Mash

ChromeLoader Browser Hijacking Campaign - Summary

ChromeLoader browser hijacker/adware campaign was first discovered in January 2022 and spread very quickly. One of its uncommon traits was [...]
  • News
Posted on July 13, 2022 by Mash

Microsoft Announces General Avaliability for Windows Autopatch Feature

Microsoft has announced that the Autopatch feature will be generally available for Enterprise systems. The Autopatch feature's main goal is [...]
  • News
  • Microsoft
  •  
  • Windows
Posted on July 12, 2022 by Mash

Known Office Bug Causing Crashes When Working With Cloud Documents Fixed by Microsoft

Microsoft has fixed a known bug that causes Office apps (such as Excel, Word, and PowerPoint) to unexpectedly close when [...]
  • News
  • Microsoft
  •  
  • Office
Posted on July 9, 2022 by Mash

Apple's New Feature Lockdown Mode Will Protect High-risk Individuals Against Spyware Attacks

Apple has announced a new feature called Lockdown Mode coming along with iOS 16. The main goal of the feature [...]
  • News
  • Apple
Posted on July 8, 2022 by Mash

Microsoft Has Confirmed That ShadowCoerce Vulnerability Was Fixed

Microsoft has confirmed that the ShadowCoerce Windows NTLM relay vulnerability has been fixed. According to Microsoft's spokesperson, "the MS-FSRVP coercion [...]
  • News
Posted on July 6, 2022 by Mash

Google Has Released a Fix for New High Severity Chrome Zero-day

Google has addressed a high severity vulnerability tracked as CVE-2022-2294 in the Chrome 103.0.5060.114 update. The zero-day is a heap-based [...]
  • News
  • chrome
  •  
  • Google
Posted on July 5, 2022 by Mash

KISA Has Released a Free Decryptor for Hive Ransomware

South Korean cybersecurity agency KISA (Korean Internet & Security Agency) has released a free decryptor for Hive ransomware, working for [...]
Uncategorized
Posted on July 1, 2022 by Mash

Internet Providers Cut a Deal with Spyware Vendor - Helping to Infect iOS and Android Users

According to Google's Threat Analysis Group, Italian spyware vendor RCS Labs has struck a deal with several ISPs to infect [...]
  • News
Posted on June 24, 2022 by Mash

Security Researcher Created a Website that Generates a Fingerprint of User's Device Using Google Chrome

It is possible to track users on the web by creating fingerprints or tracking hashes based on the characteristics of [...]
  • News
Posted on June 20, 2022 by Mash

Microsoft Has Released a New Security Update - Fixed Follina Zero-day

Microsoft has released security updates together with the June 2022 cumulative Windows updates, which address Follina zero-day that has been [...]
  • News
Posted on June 15, 2022 by Mash

New Malware Loader SVCReady Discovered - Spreads via Word Documents

A malware loader SVCReady has been discovered recently, most commonly used in phishing attacks. SVCReady specific trait is an unusual [...]
  • News
Posted on June 8, 2022 by Mash

Ransomware Gang Defacing Compromised Companies' Websites

Ransomware gang Industrial Spy, a data extortion gang that actively uses ransomware in their attacks, has begun to display ransom [...]
  • News
Posted on June 4, 2022 by Mash

New Windows Search Vulnerability Exploited to Download Remotely Hosted Malware

New Windows Search zero-day allows hackers to download remotely hosted malware by launching a Word document, which is possible due [...]
  • News
  • Windows
Posted on June 2, 2022 by Mash

Windows MSDT Zero-day Follina is Actively Exploited by Chinese APT Group

Recently discovered Microsoft Office zero-day vulnerability known as Follina is now actively being exploited in the wild by the Chinese [...]
  • News
  • Follina
Posted on June 1, 2022 by Mash

New Microsoft Office Code Execution Vulnerability Follina Is Spotted in the Wild

A new zero-day vulnerability in Microsoft Office and Windows has been recently discovered in the wild, targeting Russian users and [...]
  • News
  • Follina
Posted on May 31, 2022 by Mash

New Microsoft Edge Feature "Drop" Allows Users to Save and Share Files and Notes

One of the many features coming to the Microsoft Edge is the analog of the Telegram's saved messages function. The [...]
  • News
  • Microsoft Edge
Posted on May 30, 2022 by Mash

Zoom Addresses Security Vulnerabilities That Allow Attackers to Hack Users by Sending a Chat Message

A set of four security vulnerabilities has been addressed by Zoom. Those flaws allow hackers to compromise other users by [...]
  • News
Posted on May 25, 2022 by Mash

Major Update for Windows 11's Android Integration Brings New Improvements

Windows 11 has recently received support for Android apps with supported hardware. A new Windows 11 major update updates the [...]
  • News
  • Android
  •  
  • Windows 11
Posted on May 21, 2022 by Mash

Apple Releases Emergency Security Updates to Address a Zero-day Used to Target Macs, Apple Watches

Apple has released emergency security updates to address a zero-day vulnerability to target Macs and Apple Watch devices. The vulnerability [...]
  • News
  • Apple
Posted on May 17, 2022 by Mash

Sysrv Botnet Deploys Cryptominers on Vulnerable Windows and Linux Servers, Microsoft Warns

According to Microsoft, the Sysrv botnet is actively targeting vulnerable Windows and Linux servers by abusing vulnerabilities in the Spring [...]
  • News
  • Microsoft
Posted on May 14, 2022 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software