Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

TigerJack Threat Actor Resurfaces with Malicious VSCode Extensions

A threat actor known as TigerJack is persistently targeting developers with harmful extensions on both the VSCode Marketplace and the [...]
  • News
Posted on October 16, 2025 by Mash

Microsoft Limits IE Mode in Edge Following Zero-Day Exploits

Microsoft is imposing new restrictions on the Internet Explorer (IE) mode within its Edge browser after discovering active zero-day exploits. [...]
  • News
Posted on October 15, 2025 by Mash

New Yorkers Targeted by Fake "Inflation Refund" Text Message Scam

A new smishing campaign is deceiving New York residents with fraudulent text messages that impersonate the state's Department of Taxation [...]
  • News
Posted on October 14, 2025 by Mash

Apple Increases Maximum Bug Bounty to $2 Million for Critical Flaws

Apple has significantly expanded its bug bounty program, doubling the top reward to $2 million for zero-click remote code execution [...]
  • News
Posted on October 11, 2025 by Mash

ClayRat Spyware Disguised as Popular Apps Targets Android Users

A new Android spyware known as ClayRat is being distributed by impersonating popular applications like WhatsApp, TikTok, and YouTube. The [...]
  • News
Posted on October 11, 2025 by Mash

Qilin Ransomware Gang Publishes Stolen Data from Asahi Brewery Attack

The Qilin ransomware group has publicly claimed responsibility for a cyberattack on Asahi, Japan's largest brewing company. The hackers allege [...]
  • News
Posted on October 9, 2025 by Mash

Google Declines to Patch ASCII Smuggling Vulnerability in Gemini AI

A security researcher has discovered that Google's Gemini AI is vulnerable to ASCII smuggling attacks, a technique that uses invisible [...]
  • News
Posted on October 8, 2025 by Mash

Medusa Ransomware Gang Exploits Critical GoAnywhere MFT Flaw

A threat actor known as Storm-1175 is actively exploiting a critical vulnerability in Fortra's GoAnywhere MFT secure file transfer tool. [...]
  • News
Posted on October 8, 2025 by Mash

Oracle Issues Emergency Patch for EBS Zero-Day Exploited by Clop Ransomware

Oracle has released an emergency security update for a critical zero-day vulnerability, tracked as CVE-2025-61882, in its E-Business Suite (EBS). [...]
  • News
Posted on October 7, 2025 by Mash

Signal Implements New Post-Quantum Encryption Protocol

Signal has introduced a new cryptographic defense named Sparse Post-Quantum Ratchet (SPQR) to protect user communications against potential future quantum [...]
  • News
Posted on October 5, 2025 by Mash

Fake Signal and ToTok Apps Used to Distribute Android Spyware

Two distinct spyware campaigns, dubbed ProSpy and ToSpy, are deceiving Android users by posing as legitimate messaging applications. The malicious [...]
  • News
Posted on October 4, 2025 by Mash

Classic Outlook Crash Bug Requires Microsoft Support for Resolution

Microsoft is addressing a known issue causing the classic Outlook client for Windows to crash immediately upon launch. This problem [...]
  • News
Posted on October 2, 2025 by Mash

MatrixPDF Toolkit Weaponizes PDFs for Phishing and Malware Attacks

A new malicious toolkit named MatrixPDF enables threat actors to transform standard PDF files into interactive phishing lures that evade [...]
  • News
Posted on October 2, 2025 by Mash

Critical Sudo Vulnerability Exploited in Linux and Unix Systems, CISA Warns

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw in the Sudo command-line utility to its [...]
  • News
Posted on September 30, 2025 by Mash

Microsoft Lifts Windows 11 24H2 Upgrade Block for Affected Intel PCs

Microsoft has removed a compatibility block that was preventing certain Intel-based PCs from upgrading to Windows 11 version 24H2. The [...]
  • News
Posted on September 30, 2025 by Mash

Malicious Ads Distribute Oyster Backdoor via Fake Teams Installers

Cybercriminals are using search engine advertisements and SEO poisoning to distribute a fake Microsoft Teams installer that installs the Oyster [...]
  • News
Posted on September 28, 2025 by Mash

Critical GoAnywhere MFT Flaw Exploited as a Zero-Day Prior to Patch

A maximum-severity vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software is being actively exploited by attackers. Tracked as CVE-2025-10035, [...]
  • News
Posted on September 28, 2025 by Mash

New XCSSET Malware Variant Targets macOS Developers with Enhanced Stealing Capabilities

A new version of the XCSSET malware is being used in limited attacks against macOS developers, according to Microsoft Threat [...]
  • News
Posted on September 26, 2025 by Mash

Cisco Patches Actively Exploited Zero-Day Flaw in Network Device Software

Cisco has issued security updates to fix a high-severity zero-day vulnerability, tracked as CVE-2025-20352, which is being actively exploited in [...]
  • News
Posted on September 26, 2025 by Mash

SonicWall Issues Firmware Update to Remove Sophisticated Rootkit from VPN Appliances

SonicWall has released a critical firmware update designed to eradicate a previously unknown rootkit called OVERSTEP from its Secure Mobile [...]
  • News
Posted on September 25, 2025 by Mash

Ransomware Attack on Key Software Disrupts Major European Airports

A ransomware attack targeting critical airport systems caused significant disruptions at several major European airports over the weekend. The incident [...]
  • News
Posted on September 23, 2025 by Mash

Windows 11 Revives Video Wallpapers with Native .mp4 Support

A new native feature in Windows 11 will allow users to set video files as their desktop background, with the [...]
  • News
Posted on September 23, 2025 by Mash

GPT-4-Powered Malware Dynamically Generates Ransomware and Reverse Shells

Security researchers have identified what may be the earliest known malware embedded with a large language model, dubbed MalTerminal. This [...]
  • News
Posted on September 21, 2025 by Mash

Zero-Click ShadowLeak Exploit in ChatGPT Exposes Gmail Data via Hidden Commands

A critical zero-click vulnerability, named ShadowLeak, has been discovered in OpenAI’s ChatGPT Deep Research agent, allowing attackers to extract sensitive [...]
  • News
Posted on September 20, 2025 by Mash

SystemBC Malware Exploits Vulnerable VPS Servers for High-Volume Proxy Network

The operators behind the SystemBC proxy botnet are actively targeting vulnerable commercial virtual private servers (VPS) to maintain a network [...]
  • News
Posted on September 20, 2025 by Mash

AI-Generated Scripts Enhance TA558's Attacks on Latin American Hotels

The threat group TA558, also tracked as RevengeHotels, is using AI-generated scripts in a new campaign targeting hotels in Brazil [...]
  • News
Posted on September 19, 2025 by Mash

"Shai-Hulud" Worm Compromises npm Packages in Self-Spreading Attack

A self-propagating supply chain attack has compromised at least 187 npm packages, beginning with the popular @ctrl/tinycolor library, which receives [...]
  • News
Posted on September 18, 2025 by Mash

Hackers Create Fake Account in Google’s Law Enforcement Portal

Google has confirmed that cybercriminals created a fraudulent account within its Law Enforcement Request System (LERS), a platform used by [...]
  • News
Posted on September 17, 2025 by Mash

Sophisticated VoidProxy Phishing Service Bypasses MFA and SSO Protections

A new phishing-as-a-service platform named VoidProxy is targeting Microsoft 365 and Google accounts, even when protected by third-party single sign-on [...]
  • News
Posted on September 16, 2025 by Mash

Malicious VSCode Extensions Used to Steal Cryptocurrency Wallets

A threat actor known as WhiteCobra is distributing fraudulent extensions across the Visual Studio Marketplace and OpenVSX registry, targeting developers [...]
  • News
Posted on September 15, 2025 by Mash

New HybridPetya Ransomware Exploits UEFI Flaw to Bypass Secure Boot

A recently identified ransomware variant, named HybridPetya, mimics the behavior of the infamous Petya/NotPetya malware but adds the capability to [...]
  • News
Posted on September 14, 2025 by Mash

Microsoft Removes Fees for Developers Publishing Apps on Its Store

Microsoft has eliminated the registration fee for individual developers who want to publish their applications on the Microsoft Store. This [...]
  • News
Posted on September 13, 2025 by Mash

Cursor IDE’s Auto-Run Feature Poses Significant Security Risk

A security vulnerability in the Cursor AI code editor could allow malicious repositories to automatically execute harmful code as soon [...]
  • News
Posted on September 12, 2025 by Mash

Microsoft's Anti-Spam Bug Incorrectly Blocks Links in Exchange and Teams

A malfunction in Microsoft’s anti-spam service is mistakenly flagging legitimate URLs as malicious, preventing users from opening links in Exchange [...]
  • News
Posted on September 11, 2025 by Mash

Sophisticated Malvertising Campaign Uses Fake GitHub Commits to Distribute GPU-Gated Malware

A new malware operation, dubbed GPUGate, is using malicious Google Ads and counterfeit GitHub commit pages to target IT and [...]
  • News
Posted on September 9, 2025 by Mash

Phishing Scams Leverage Apple's iCloud Calendar to Bypass Email Filters

Cybercriminals are exploiting iCloud Calendar's invitation system to distribute fraudulent emails that appear to originate directly from Apple's official servers. [...]
  • News
Posted on September 9, 2025 by Mash

SVG Files Used to Conceal Sophisticated Phishing Campaign

VirusTotal's AI Code Insight feature has uncovered a previously undetected phishing operation that uses SVG image files to impersonate Colombia's [...]
  • News
Posted on September 8, 2025 by Mash

Attackers Deploy Backdoors via Legacy Sitecore Configuration Flaw

Cybercriminals are actively exploiting a zero-day vulnerability in older Sitecore systems to install WeepSteel malware, a reconnaissance backdoor. This security [...]
  • News
Posted on September 7, 2025 by Mash

AI-Powered Hacking Tool Accelerates Exploitation of New Vulnerabilities

A new offensive security framework named HexStrike-AI is being actively used by hackers to quickly weaponize recently disclosed security flaws. [...]
  • News
Posted on September 5, 2025 by Mash

Zscaler Confirms Data Breach Following Salesloft Drift Supply-Chain Attack

Zscaler disclosed a security breach after attackers accessed its Salesforce environment through stolen OAuth and refresh tokens from Salesloft Drift, [...]
  • News
Posted on September 2, 2025 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software