Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Microsoft Investigating ESU Update Failure for Corporate Windows 10 Devices

Microsoft is addressing a known issue where the first extended security update (ESU) for Windows 10, KB5068781, fails to install [...]
  • News
Posted on November 16, 2025 by Mash

AMD Acknowledges Critical RDSEED Flaw in New Zen 5 Processor Line

AMD has confirmed a high-severity vulnerability within the RDSEED instruction of its latest Zen 5 architecture CPUs, which compromises the [...]
  • News
Posted on November 16, 2025 by Mash

Massive 'IndonesianFoods' Worm Floods npm Registry with Over 100,000 Packages

A self-propagating worm, dubbed 'IndonesianFoods,' is spamming the npm registry by automatically generating and publishing new packages at an alarming [...]
  • News
Posted on November 14, 2025 by Mash

DanaBot Malware Resurfaces with New Infrastructure After Law Enforcement Takedown

The DanaBot malware has reemerged in a new version after a six-month hiatus following a major international law enforcement operation. [...]
  • News
Posted on November 13, 2025 by Mash

Hackers Abuse Triofox Antivirus Feature for SYSTEM Privilege Escalation

A critical vulnerability in the Triofox file-sharing platform is being actively exploited by a threat actor to gain full system [...]
  • News
Posted on November 11, 2025 by Mash

Critical runC Flaws Pose Container Escape Risk for Docker and Kubernetes

Three newly discovered vulnerabilities in the runC container runtime could allow attackers to break out of container isolation and gain [...]
  • News
Posted on November 10, 2025 by Mash

Windows 10 Users Must Enroll in Extended Security Program for Future Patches

With Windows 10 having reached its official end of support on October 14, 2025, users must enroll in the Extended [...]
  • News
Posted on November 10, 2025 by Mash

Previously Unknown LandFall Spyware Exploited Samsung Zero-Day via WhatsApp

A newly identified spyware, dubbed LandFall, was deployed by exploiting a zero-day vulnerability in Samsung's Android image processing library. The [...]
  • News
Posted on November 9, 2025 by Mash

Google Reports Emergence of AI-Powered Malware with Self-Modifying Capabilities

Google's Threat Intelligence Group has identified a significant trend where cybercriminals are now using large language models (LLMs) to create [...]
  • News
Posted on November 7, 2025 by Mash

Critical Flaw in Post SMTP WordPress Plugin Allows Full Site Takeover

A critical vulnerability in the popular Post SMTP WordPress plugin is being actively exploited by hackers to hijack administrator accounts [...]
  • News
Posted on November 5, 2025 by Mash

Windows 11 Task Manager Fails to Close After Optional Update

Microsoft has acknowledged a bug in an optional Windows 11 update that prevents the Task Manager from closing properly. After [...]
  • News
Posted on November 4, 2025 by Mash

OpenAI Considers Introducing Advertising on ChatGPT to Boost Revenue

Facing financial pressures, OpenAI is internally debating the introduction of advertisements on its ChatGPT platform. Despite a massive user base [...]
  • News
Posted on November 3, 2025 by Mash

Chinese Hackers Exploit Windows Zero-Day to Target European Diplomats

A Chinese state-sponsored threat group, known as UNC6384 or Mustang Panda, is actively using a Windows zero-day vulnerability to spy [...]
  • News
Posted on November 2, 2025 by Mash

Massive Wave of NFC Relay Malware Targets European Payment Cards

A significant surge in Near-Field Communication (NFC) relay malware is targeting Android users, primarily in Eastern Europe, with over 760 [...]
  • News
Posted on November 1, 2025 by Mash

Typosquatting NPM Packages Deliver Cross-Platform Information Stealer

Security researchers have identified ten malicious packages on the npm registry that deploy a sophisticated information stealer capable of targeting [...]
  • News
Posted on October 30, 2025 by Mash

Chrome to Require Permission Before Loading Insecure HTTP Websites

Starting with Chrome 154 in October 2026, Google's browser will ask for user permission by default before connecting to any [...]
  • News
Posted on October 30, 2025 by Mash

Critical WSUS Flaw Actively Exploited Despite Microsoft's Emergency Patch

A critical vulnerability in Windows Server Update Services (WSUS), tracked as CVE-2025-59287, is now being actively exploited in the wild, [...]
  • News
Posted on October 29, 2025 by Mash

RedTiger Penetration Tool Abused to Create Discord Info-Stealing Malware

Cybercriminals are repurposing the open-source RedTiger penetration testing suite to create an information-stealing malware that primarily targets Discord users. The [...]
  • News
Posted on October 28, 2025 by Mash

CoPhish Attack Abuses Microsoft Copilot to Hijack Admin OAuth Tokens

A novel phishing method named 'CoPhish' exploits Microsoft Copilot Studio to deliver fraudulent OAuth consent prompts from legitimate Microsoft domains. [...]
  • News
Posted on October 26, 2025 by Mash

Massive Attack Campaign Targets Outdated WordPress Plugins for Remote Code Execution

A large-scale exploitation campaign is targeting WordPress websites using outdated versions of the GutenKit and Hunk Companion plugins. Attackers are [...]
  • News
Posted on October 26, 2025 by Mash

Microsoft Blocks File Explorer Previews for Downloaded Files to Prevent Attacks

Microsoft has disabled the File Explorer preview feature for files downloaded from the internet as a new security measure. This [...]
  • News
Posted on October 24, 2025 by Mash

Hackers Earn Nearly $800,000 for 56 Zero-Days on Pwn2Own's Second Day

On the second day of the Pwn2Own Ireland 2025 competition, security researchers demonstrated 56 previously unknown vulnerabilities, earning a total [...]
  • News
Posted on October 24, 2025 by Mash

Russian State Hackers Deploy Evolving Malware via Fake CAPTCHA Schemes

The Russian state-backed hacking group Star Blizzard, also known as ColdRiver, has rapidly evolved its malware arsenal, deploying new families [...]
  • News
Posted on October 23, 2025 by Mash

Actively Exploited Windows SMB Flaw Allows SYSTEM Privilege Escalation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that a high-severity Windows Server Message Block (SMB) vulnerability is [...]
  • News
Posted on October 22, 2025 by Mash

Fake Homebrew and LogMeIn Sites via Google Ads Distribute macOS Stealers

A malicious campaign is using Google Ads to promote counterfeit websites for popular macOS tools like Homebrew, LogMeIn, and TradingView. [...]
  • News
Posted on October 20, 2025 by Mash

Microsoft Patches Critical HTTP Smuggling Flaw in ASP.NET Core

Microsoft has addressed a maximum-severity vulnerability in ASP.NET Core, identified as CVE-2025-55315, which is an HTTP request smuggling flaw within the Kestrel [...]
  • News
Posted on October 19, 2025 by Mash

TigerJack Threat Actor Resurfaces with Malicious VSCode Extensions

A threat actor known as TigerJack is persistently targeting developers with harmful extensions on both the VSCode Marketplace and the [...]
  • News
Posted on October 16, 2025 by Mash

Microsoft Limits IE Mode in Edge Following Zero-Day Exploits

Microsoft is imposing new restrictions on the Internet Explorer (IE) mode within its Edge browser after discovering active zero-day exploits. [...]
  • News
Posted on October 15, 2025 by Mash

New Yorkers Targeted by Fake "Inflation Refund" Text Message Scam

A new smishing campaign is deceiving New York residents with fraudulent text messages that impersonate the state's Department of Taxation [...]
  • News
Posted on October 14, 2025 by Mash

Apple Increases Maximum Bug Bounty to $2 Million for Critical Flaws

Apple has significantly expanded its bug bounty program, doubling the top reward to $2 million for zero-click remote code execution [...]
  • News
Posted on October 11, 2025 by Mash

ClayRat Spyware Disguised as Popular Apps Targets Android Users

A new Android spyware known as ClayRat is being distributed by impersonating popular applications like WhatsApp, TikTok, and YouTube. The [...]
  • News
Posted on October 11, 2025 by Mash

Qilin Ransomware Gang Publishes Stolen Data from Asahi Brewery Attack

The Qilin ransomware group has publicly claimed responsibility for a cyberattack on Asahi, Japan's largest brewing company. The hackers allege [...]
  • News
Posted on October 9, 2025 by Mash

Google Declines to Patch ASCII Smuggling Vulnerability in Gemini AI

A security researcher has discovered that Google's Gemini AI is vulnerable to ASCII smuggling attacks, a technique that uses invisible [...]
  • News
Posted on October 8, 2025 by Mash

Medusa Ransomware Gang Exploits Critical GoAnywhere MFT Flaw

A threat actor known as Storm-1175 is actively exploiting a critical vulnerability in Fortra's GoAnywhere MFT secure file transfer tool. [...]
  • News
Posted on October 8, 2025 by Mash

Oracle Issues Emergency Patch for EBS Zero-Day Exploited by Clop Ransomware

Oracle has released an emergency security update for a critical zero-day vulnerability, tracked as CVE-2025-61882, in its E-Business Suite (EBS). [...]
  • News
Posted on October 7, 2025 by Mash

Signal Implements New Post-Quantum Encryption Protocol

Signal has introduced a new cryptographic defense named Sparse Post-Quantum Ratchet (SPQR) to protect user communications against potential future quantum [...]
  • News
Posted on October 5, 2025 by Mash

Fake Signal and ToTok Apps Used to Distribute Android Spyware

Two distinct spyware campaigns, dubbed ProSpy and ToSpy, are deceiving Android users by posing as legitimate messaging applications. The malicious [...]
  • News
Posted on October 4, 2025 by Mash

Classic Outlook Crash Bug Requires Microsoft Support for Resolution

Microsoft is addressing a known issue causing the classic Outlook client for Windows to crash immediately upon launch. This problem [...]
  • News
Posted on October 2, 2025 by Mash

MatrixPDF Toolkit Weaponizes PDFs for Phishing and Malware Attacks

A new malicious toolkit named MatrixPDF enables threat actors to transform standard PDF files into interactive phishing lures that evade [...]
  • News
Posted on October 2, 2025 by Mash

Critical Sudo Vulnerability Exploited in Linux and Unix Systems, CISA Warns

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw in the Sudo command-line utility to its [...]
  • News
Posted on September 30, 2025 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software