Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Threat Actors Distribute Their Malware Through Google Alerts

Threat actors continue to abuse Google Alerts to spread scams and promote malicious websites, however, the activity of the abuse [...]
  • News
Posted on April 20, 2021 by Mash

Codecov Code Coverage Tool Hacked In Supply-chain Attack

Codecov's Bash Uploader script got modified by a threat actor, according to the company's investigation, exposing sensitive information in customers' [...]
  • News
Posted on April 17, 2021 by Mash

NFT Marketplace Rarible Targeted By Scammers

An NFT, or Non-Fungible Token, is data stored on a cryptocurrency blockchain that a digital certificate has signed to prove [...]
  • News
Posted on April 16, 2021 by Mash

Cryptocurrency Stealing Malware HackBoss Distributed Via Telegram

HackBoss is a cryptocurrency stealing malware distributed via Telegram channel HackBoss, which promises users hacking and cracking applications. Hackers spread [...]
  • News
  • cryptocurrency
Posted on April 16, 2021 by Mash

Microsoft Is Replacing 'Administrative Tools' Menu With 'Windows Tools' Control Panel

'Administrative tools' is a menu that historically contained a variety of shortcuts to tools that allowed users to configure Windows [...]
  • News
  • Windows
Posted on April 15, 2021 by Mash

Ransomware Gang Used Old VPN Device To Breach Capcom Network

Capcom has disclosed the details on the investigation of the ransomware attack the company suffered last year. Threat actor hit [...]
  • News
Posted on April 15, 2021 by Mash

IceID is replaced with QBot malware In Malspam Campaigns

Malware distributors are rotating payloads, switching IceID with QBot malware. Both of those are banking trojans that are often used [...]
  • News
Posted on April 14, 2021 by Mash

Malicious NPM Package Targets NodeJS Developers Using Linux And macOS

The malicious package is called "web-browserify", and it imitates the popular npm component Browserify. The package contains of a manifest [...]
  • News
Posted on April 14, 2021 by Mash

Chromium-based Browsers Zero-day Shared On Twitter

Security researcher Rajvardhan Agarwal released a working proof-of-concept (PoC) exploit for a remote code execution vulnerability for the V8 JavaScript [...]
  • News
  • Google
Posted on April 13, 2021 by Mash

Zoom Zero-day Vulnerability Allows Hackers To Trigger Remote Code Execution

Zoom Zero-day vulnerability has been disclosed by security researchers during the Pwn2Own contest, which is a contest for cybersecurity professionals [...]
  • News
  • Pwn2Own
  •  
  • Zoom
Posted on April 10, 2021 by Mash

LinkedIn Massive Data Leak - Scraped Data Of 500 Million Users Sold Online

An archive containing scraped data of 500 million LinkedIn users has been put for sale on a popular hacking forum, [...]
  • News
Posted on April 9, 2021 by Mash

North Korean Hackers Targeting Freighters With Backdoor Malware

Hackers from North Korean hacking group Lazarus are using their new malware dubbed Vyveva to attack South African freight logistics [...]
  • News
  • Lazarus
  •  
  • Vyveva
Posted on April 9, 2021 by Mash

Google Addresses NAT Slipstreaming Vulnerability By Blocking Port 10080

Google Chrome now blocks HTTPS, HTTP, and FTP access to TCP port 10080 to prevent ports from being abused in [...]
  • News
  • Google
  •  
  • Google Chrome
Posted on April 9, 2021 by Mash

New Android Malware Disguises Itself As Fake Netflix Tool

Researchers at Check Point Research (CPR) have discovered the malware on Google's Play Store disguised as an app named FlixOnline, [...]
  • News
  • Android
Posted on April 8, 2021 by Mash

Gigaset Anrdoid Phones Infected By Malware Via Compromised Update Server

Gigaset is a German manufacturer of telecommunications devices, including a series of smartphones running the Android operating system. Starting on [...]
  • News
Posted on April 8, 2021 by Mash

Banking Trojan Janeleiro Is Targeting Latin American Users

Security researchers have uncovered the data about the banking trojan dubbed Janeleiro, which has been active since 2019, targeting corporate [...]
  • News
Posted on April 7, 2021 by Mash

How To Check If Your Personal Data Was Exposed In Facebook's Recent Data Breach

Two days ago threat actor released personal information of 533,313,128 Facebook users on a hacking forum including name, gender, location, [...]
  • News
  • Facebook
Posted on April 6, 2021 by Mash

Google Limits The Number Of Apps That Can Access The App List On User's Devices

Certain apps, including well-known ones, have been historically collecting data about other apps on user's devices. An academic study posted [...]
  • News
Posted on April 4, 2021 by Mash

State Hackers Are Targeting Fortinet FortiOS Servers With Multiple Exploits, Warns FBI, CISA

The Joint Cybersecurity Advisory (CSA) published today by the FBI and CISA warns administrators and users of APT (advanced persistent [...]
  • News
Posted on April 3, 2021 by Mash

Researcher Uses Coinhive Domain To Warn Users About Hacked Websites

Coinhive was an in-browser crypto mining platform that allowed websites to inject JavaScript code into websites to mine Monero cryptocurrency [...]
  • News
  • Coinhive
Posted on April 2, 2021 by Mash

BazarCall Malware Is Distributed Via Fake Call Centers

The malware BazarCall has been distributed by fake call centers since January 2021. Threat actors use that malware to install [...]
  • News
  • BazarCall
Posted on April 1, 2021 by Mash

New Android Malware Disguised As System Update Steals Data From Users

New malware with extensive spyware capabilities spies on users through infected Android devices. The spyware triggers when the data is [...]
  • News
Posted on March 31, 2021 by Mash

Apple Has Fixed iOS Zero-day Vulnerability Actively Exploited In The Wild

The vulnerability tracked as CVE-2021-1879 was discovered in the Webkit browser engine and allowed hackers to launch cross-site scripting attacks. [...]
  • News
Posted on March 27, 2021 by Mash

Cloudflare's New Feature Protects Sites From JavaScript-based Attacks

Regular cyberattacks introduce JavaScript into the website to redirect users to malicious sites, exploit vulnerabilities, and steal user's submitted data, [...]
  • News
Posted on March 26, 2021 by Mash

Google Has Removed ClearURL Extension From The Chrome Web Store.

ClearURLs is a browser extension that automatically removes tracking elements from URLs, which according to the developer, helps to protect [...]
  • News
Posted on March 25, 2021 by Mash

Purple Fox Malware Is Back With Worm-like Capabilities

Purple Fox malware that was previously distributed by phishing emails has added a worm module to its list of capabilties [...]
  • News
Posted on March 24, 2021 by Mash

Hacking Group Targets Windows, iOS, Android Users Using 11 Zero-Days

Google's zero-day bug-hunting team Project Zero reports that the hacking group launched several campaigns targeting Windows, iOS, Android throughout 2020, [...]
  • News
Posted on March 21, 2021 by Mash

REvil Now Can Encrypt Files In Safe Mode

REvil ransomware now has 'Windows Safe Mode' encryption mode - the ransomware can encrypt files in Windows Safe Mode to [...]
  • News
  • REvil
Posted on March 20, 2021 by Mash

Acer Hit By REvil Ransomware Attack, Hackers Demand Huge Ransom

Acer is a Taiwanese electronics and computer maker specializing in laptops, desktops, and monitors. The company has been hit by [...]
  • News
  • Acer
  •  
  • REvil
Posted on March 20, 2021 by Mash

New SolarWinds Activity Detection Tool Released By CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has created a new tool to detect SolarWinds malicious activity in enterprise environments. [...]
  • News
Posted on March 19, 2021 by Mash

Malicious Xcode Project XcodeSpy Targets iOS Devs In Supply-Chain Attack

XcodeSpy malware targets iOS devs and install macOS backdoor on the victim's device. Xcode is a development environment created by [...]
  • News
Posted on March 19, 2021 by Mash

Researcher Shows The Method Of Hiding ZIP, MP3 Files Inside Twitter Images

Security researcher David Buchanan has demonstrated a method of storing MP3 and ZIP data inside the Twitter image. The 6 [...]
  • News
Posted on March 18, 2021 by Mash

Microsoft Released One-Click Exchange On-Premises Tool To Help Mitigate ProxyLogon Vulnerabilities

Recently Microsoft has disclosed four vulnerabilities that are actively used together in attacks against Microsoft Exchange. Those vulnerabilities are now [...]
  • News
Posted on March 17, 2021 by Mash

Microsoft Releases Temporary Fix For Windows 10 BSOD Printing Crashes

Microsoft has provided a temporary fix for the bug that causes Windows 10 to crash when printing. The bug appears [...]
  • News
  • Microsoft
Posted on March 14, 2021 by Mash

Microsoft's Annoying Pop-Up Ads Ignore Ad Blockers

Microsoft's known strategy to aggressively advertise their new features with pop-up ads is back, and even ad blockers can't do [...]
  • News
  • Microsoft
Posted on March 13, 2021 by Mash

Microsoft Exchange ProxyLogon Exploits Are Now Used By Cryptomining Software

The operators of Lemon_Duck, a cryptomining botnet targeting enterprise networks, are now using Microsoft Exchange Proxylogon exploits in their attacks. [...]
  • News
  • Lemon_Duck
Posted on March 13, 2021 by Mash

Chinese state hackers target Linux systems with new backdoor RedXOR

According to Intezer security researchers, a previously undocumented backdoor malware RedXOR with links to Chinese hacking groups is used in [...]
  • News
Posted on March 12, 2021 by Mash

OVH Data Center Burns Down, Major Web Services Inaccessible

OVH data centers have been destroyed by fire in a major incident. OVH is the third-largest provider in the world, [...]
  • News
Posted on March 11, 2021 by Mash

New Microsoft PowerShell Script Checks Exchange Servers For ProxyLogon Hacks

On March 2nd Microsoft released an emergency security update to fix four ProxyLogon vulnerabilities that were actively used in attacks [...]
  • News
  • Exchange
  •  
  • Microsoft
  •  
  • ProxyLogon
Posted on March 7, 2021 by Mash

Three New Malware Strains Used By SolarWinds Hackers Revealed By Microsoft

Microsoft has revealed the data on malware that SolarWinds hackers deployed as the second-stage payloads. Three new malware strains are [...]
  • News
  • SolarWinds
Posted on March 5, 2021 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software