Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

OpenAI Considers Introducing Advertising on ChatGPT to Boost Revenue

Facing financial pressures, OpenAI is internally debating the introduction of advertisements on its ChatGPT platform. Despite a massive user base [...]
  • News
Posted on November 3, 2025 by Mash

Chinese Hackers Exploit Windows Zero-Day to Target European Diplomats

A Chinese state-sponsored threat group, known as UNC6384 or Mustang Panda, is actively using a Windows zero-day vulnerability to spy [...]
  • News
Posted on November 2, 2025 by Mash

Massive Wave of NFC Relay Malware Targets European Payment Cards

A significant surge in Near-Field Communication (NFC) relay malware is targeting Android users, primarily in Eastern Europe, with over 760 [...]
  • News
Posted on November 1, 2025 by Mash

Typosquatting NPM Packages Deliver Cross-Platform Information Stealer

Security researchers have identified ten malicious packages on the npm registry that deploy a sophisticated information stealer capable of targeting [...]
  • News
Posted on October 30, 2025 by Mash

Chrome to Require Permission Before Loading Insecure HTTP Websites

Starting with Chrome 154 in October 2026, Google's browser will ask for user permission by default before connecting to any [...]
  • News
Posted on October 30, 2025 by Mash

Critical WSUS Flaw Actively Exploited Despite Microsoft's Emergency Patch

A critical vulnerability in Windows Server Update Services (WSUS), tracked as CVE-2025-59287, is now being actively exploited in the wild, [...]
  • News
Posted on October 29, 2025 by Mash

RedTiger Penetration Tool Abused to Create Discord Info-Stealing Malware

Cybercriminals are repurposing the open-source RedTiger penetration testing suite to create an information-stealing malware that primarily targets Discord users. The [...]
  • News
Posted on October 28, 2025 by Mash

CoPhish Attack Abuses Microsoft Copilot to Hijack Admin OAuth Tokens

A novel phishing method named 'CoPhish' exploits Microsoft Copilot Studio to deliver fraudulent OAuth consent prompts from legitimate Microsoft domains. [...]
  • News
Posted on October 26, 2025 by Mash

Massive Attack Campaign Targets Outdated WordPress Plugins for Remote Code Execution

A large-scale exploitation campaign is targeting WordPress websites using outdated versions of the GutenKit and Hunk Companion plugins. Attackers are [...]
  • News
Posted on October 26, 2025 by Mash

Microsoft Blocks File Explorer Previews for Downloaded Files to Prevent Attacks

Microsoft has disabled the File Explorer preview feature for files downloaded from the internet as a new security measure. This [...]
  • News
Posted on October 24, 2025 by Mash

Hackers Earn Nearly $800,000 for 56 Zero-Days on Pwn2Own's Second Day

On the second day of the Pwn2Own Ireland 2025 competition, security researchers demonstrated 56 previously unknown vulnerabilities, earning a total [...]
  • News
Posted on October 24, 2025 by Mash

Russian State Hackers Deploy Evolving Malware via Fake CAPTCHA Schemes

The Russian state-backed hacking group Star Blizzard, also known as ColdRiver, has rapidly evolved its malware arsenal, deploying new families [...]
  • News
Posted on October 23, 2025 by Mash

Actively Exploited Windows SMB Flaw Allows SYSTEM Privilege Escalation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that a high-severity Windows Server Message Block (SMB) vulnerability is [...]
  • News
Posted on October 22, 2025 by Mash

Fake Homebrew and LogMeIn Sites via Google Ads Distribute macOS Stealers

A malicious campaign is using Google Ads to promote counterfeit websites for popular macOS tools like Homebrew, LogMeIn, and TradingView. [...]
  • News
Posted on October 20, 2025 by Mash

Microsoft Patches Critical HTTP Smuggling Flaw in ASP.NET Core

Microsoft has addressed a maximum-severity vulnerability in ASP.NET Core, identified as CVE-2025-55315, which is an HTTP request smuggling flaw within the Kestrel [...]
  • News
Posted on October 19, 2025 by Mash

TigerJack Threat Actor Resurfaces with Malicious VSCode Extensions

A threat actor known as TigerJack is persistently targeting developers with harmful extensions on both the VSCode Marketplace and the [...]
  • News
Posted on October 16, 2025 by Mash

Microsoft Limits IE Mode in Edge Following Zero-Day Exploits

Microsoft is imposing new restrictions on the Internet Explorer (IE) mode within its Edge browser after discovering active zero-day exploits. [...]
  • News
Posted on October 15, 2025 by Mash

New Yorkers Targeted by Fake "Inflation Refund" Text Message Scam

A new smishing campaign is deceiving New York residents with fraudulent text messages that impersonate the state's Department of Taxation [...]
  • News
Posted on October 14, 2025 by Mash

Apple Increases Maximum Bug Bounty to $2 Million for Critical Flaws

Apple has significantly expanded its bug bounty program, doubling the top reward to $2 million for zero-click remote code execution [...]
  • News
Posted on October 11, 2025 by Mash

ClayRat Spyware Disguised as Popular Apps Targets Android Users

A new Android spyware known as ClayRat is being distributed by impersonating popular applications like WhatsApp, TikTok, and YouTube. The [...]
  • News
Posted on October 11, 2025 by Mash

Qilin Ransomware Gang Publishes Stolen Data from Asahi Brewery Attack

The Qilin ransomware group has publicly claimed responsibility for a cyberattack on Asahi, Japan's largest brewing company. The hackers allege [...]
  • News
Posted on October 9, 2025 by Mash

Google Declines to Patch ASCII Smuggling Vulnerability in Gemini AI

A security researcher has discovered that Google's Gemini AI is vulnerable to ASCII smuggling attacks, a technique that uses invisible [...]
  • News
Posted on October 8, 2025 by Mash

Medusa Ransomware Gang Exploits Critical GoAnywhere MFT Flaw

A threat actor known as Storm-1175 is actively exploiting a critical vulnerability in Fortra's GoAnywhere MFT secure file transfer tool. [...]
  • News
Posted on October 8, 2025 by Mash

Oracle Issues Emergency Patch for EBS Zero-Day Exploited by Clop Ransomware

Oracle has released an emergency security update for a critical zero-day vulnerability, tracked as CVE-2025-61882, in its E-Business Suite (EBS). [...]
  • News
Posted on October 7, 2025 by Mash

Signal Implements New Post-Quantum Encryption Protocol

Signal has introduced a new cryptographic defense named Sparse Post-Quantum Ratchet (SPQR) to protect user communications against potential future quantum [...]
  • News
Posted on October 5, 2025 by Mash

Fake Signal and ToTok Apps Used to Distribute Android Spyware

Two distinct spyware campaigns, dubbed ProSpy and ToSpy, are deceiving Android users by posing as legitimate messaging applications. The malicious [...]
  • News
Posted on October 4, 2025 by Mash

Classic Outlook Crash Bug Requires Microsoft Support for Resolution

Microsoft is addressing a known issue causing the classic Outlook client for Windows to crash immediately upon launch. This problem [...]
  • News
Posted on October 2, 2025 by Mash

MatrixPDF Toolkit Weaponizes PDFs for Phishing and Malware Attacks

A new malicious toolkit named MatrixPDF enables threat actors to transform standard PDF files into interactive phishing lures that evade [...]
  • News
Posted on October 2, 2025 by Mash

Critical Sudo Vulnerability Exploited in Linux and Unix Systems, CISA Warns

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw in the Sudo command-line utility to its [...]
  • News
Posted on September 30, 2025 by Mash

Microsoft Lifts Windows 11 24H2 Upgrade Block for Affected Intel PCs

Microsoft has removed a compatibility block that was preventing certain Intel-based PCs from upgrading to Windows 11 version 24H2. The [...]
  • News
Posted on September 30, 2025 by Mash

Malicious Ads Distribute Oyster Backdoor via Fake Teams Installers

Cybercriminals are using search engine advertisements and SEO poisoning to distribute a fake Microsoft Teams installer that installs the Oyster [...]
  • News
Posted on September 28, 2025 by Mash

Critical GoAnywhere MFT Flaw Exploited as a Zero-Day Prior to Patch

A maximum-severity vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software is being actively exploited by attackers. Tracked as CVE-2025-10035, [...]
  • News
Posted on September 28, 2025 by Mash

New XCSSET Malware Variant Targets macOS Developers with Enhanced Stealing Capabilities

A new version of the XCSSET malware is being used in limited attacks against macOS developers, according to Microsoft Threat [...]
  • News
Posted on September 26, 2025 by Mash

Cisco Patches Actively Exploited Zero-Day Flaw in Network Device Software

Cisco has issued security updates to fix a high-severity zero-day vulnerability, tracked as CVE-2025-20352, which is being actively exploited in [...]
  • News
Posted on September 26, 2025 by Mash

SonicWall Issues Firmware Update to Remove Sophisticated Rootkit from VPN Appliances

SonicWall has released a critical firmware update designed to eradicate a previously unknown rootkit called OVERSTEP from its Secure Mobile [...]
  • News
Posted on September 25, 2025 by Mash

Ransomware Attack on Key Software Disrupts Major European Airports

A ransomware attack targeting critical airport systems caused significant disruptions at several major European airports over the weekend. The incident [...]
  • News
Posted on September 23, 2025 by Mash

Windows 11 Revives Video Wallpapers with Native .mp4 Support

A new native feature in Windows 11 will allow users to set video files as their desktop background, with the [...]
  • News
Posted on September 23, 2025 by Mash

GPT-4-Powered Malware Dynamically Generates Ransomware and Reverse Shells

Security researchers have identified what may be the earliest known malware embedded with a large language model, dubbed MalTerminal. This [...]
  • News
Posted on September 21, 2025 by Mash

Zero-Click ShadowLeak Exploit in ChatGPT Exposes Gmail Data via Hidden Commands

A critical zero-click vulnerability, named ShadowLeak, has been discovered in OpenAI’s ChatGPT Deep Research agent, allowing attackers to extract sensitive [...]
  • News
Posted on September 20, 2025 by Mash

SystemBC Malware Exploits Vulnerable VPS Servers for High-Volume Proxy Network

The operators behind the SystemBC proxy botnet are actively targeting vulnerable commercial virtual private servers (VPS) to maintain a network [...]
  • News
Posted on September 20, 2025 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software