Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Russian Hackers Breach Multiple French IT Providers by Exploiting Old Centreon Software

According to the report by French cybersecurity agency ANSSI, Russian hackers have successfully managed to exploit Centreon Software to infiltrate [...]
  • News
  • Centreon
Posted on February 18, 2021 by Mash

Telegram's privacy feature failed to delete self-destructing video files

Telegram's 'Secret chat' feature offers increased privacy than the standard chats. Security researcher Dhiraj Mishra has discovered a vulnerability in [...]
  • News
  • Telegram
Posted on February 17, 2021 by Mash

Android spyware strains connected to state-sponsored hacking group

According to cybersecurity firm Lookout, two malware strains dubbed Hornbill and SunBird, have been linked to Confucius hacking group, which [...]
  • News
Posted on February 13, 2021 by Mash

Copycats imitate novel supply chain attack

A recent supply chain attack was done by security researcher Alex Birsan, who managed to infiltrate 35 big tech companies [...]
  • News
Posted on February 13, 2021 by Mash

Avaddon ransomware fixes free decryption flaw

Avaddon ransomware gang has fixed a flaw that allowed victims to recover their files without paying a ransom, which was [...]
  • News
  • Avaddon
  •  
  • ransomware
Posted on February 12, 2021 by Mash

BazarBackdoor malware has been rewritten in Nim to evade antivirus

TrickBot's BazarBackdoor has been actively distributed through spam campaigns. BazarBackdoor allows hackers to get remote access to the computer to spread [...]
  • News
  • BazarBackdoor
  •  
  • TrickBot
Posted on February 12, 2021 by Mash

Microsoft fixed bug allowing attackers to trigger BSOD crashes

The bug that lets attackers crash Windows 10 by creating specific downloads, the system would crash once the folder is [...]
  • How-to
  • Microsoft
  •  
  • Windows
Posted on February 11, 2021 by Mash

Microsoft forces secure RPC to address Zerologon attacks

Zerologon is a critical Netlogon Windows server process security flow that allows hackers to elevate privileges to domain administrators and [...]
  • News
  • Windows
  •  
  • Zerologon
Posted on February 11, 2021 by Mash

CD Projekt Red got hit with HelloKitty ransomware, source code stolen

CD Projekt Red has disclosed that they were a target of a cyberattack of a ransomware attack and got their [...]
  • News
  • CDPR
  •  
  • HelloKitty
  •  
  • ransomware
Posted on February 11, 2021 by Mash

Hackers gained access to Oldsmar water treatment system, attempted to poison the town

Last Friday hackers managed to breach the water facility for the city of Oldsmar, Florida and attempted to increase the [...]
  • News
Posted on February 9, 2021 by Mash

Phishing campaign uses Morse code to hide malicious URLs

Recent phishing campaign has surprised security researchers by utilizing Morse code to bypass security mail getaways and mail filters. This [...]
  • News
Posted on February 8, 2021 by Mash

Mozilla releases Firefox 85.0.1, fixes Windows 10 NTFS corruption bug

Mozilla has fixed a recently reported bug that allowed non-privileged users to mark an NTFS volume as dirty. That caused [...]
  • News
Posted on February 7, 2021 by Mash

Malicious extension steals user data by abusing the Chrome sync feature

Chrome sync is a browser feature that automatically synchronizes user's bookmarks, history, passwords, and other settings after they log in [...]
  • News
  • chrome
Posted on February 6, 2021 by Mash

Fake WhatsApp app allows hackers to spy on iPhone users

Cybersecurity researchers at Citizen Lab and journalists at Motherboard has spotted a fake WhatsApp app, linked to an Italian company [...]
  • News
  • WhatsApp
Posted on February 6, 2021 by Mash

StormShield cybersecurity company got hacked, firewall source code stolen

Leading French cybersecurity firm StormShield has disclosed that their systems got hacked, resulting in a threat actor being able to [...]
  • News
  • StormShield
Posted on February 5, 2021 by Mash

Chrome zero-day exploited in the wild has been fixed

Google has addressed zero-day vulnerability for Chrome version 88.0.4324.150 that has been actively exploited recently. The vulnerability has been tracked [...]
  • News
Posted on February 5, 2021 by Mash

Cisco has fixed critical code execution bugs in SMB VPN routers

Cisco has addressed pre-auth remote code execution (RCE) vulnerabilities affecting several VPN routers Those vulnerabilities allowed attackers to execute arbitrary [...]
  • News
Posted on February 4, 2021 by Mash

Chrome updates detected as backdoors by Microsoft Defender

Microsoft Defender detects Chrome updates as PHP backdoors because of the Slovenian localization file bundled with the Chrome installer. The [...]
  • News
Posted on February 4, 2021 by Mash

SonicWall SMA 100 zero-day vulnerability exploited in the wild

According to the report by cybersecurity company NCC Group, SonicWall zero-day exploit has been used in the wild. NCC Group [...]
  • News
  • SonicWall
Posted on February 2, 2021 by Mash

Malicious Home Depot ad gets placed as a top Google search result

There has been a lot of different campaigns using malicious ads in the past. The ads disguised themselves as the [...]
  • News
Posted on January 31, 2021 by Mash

Fonix ransomware shuts down their operations, releases master decryption key

Fonix ransomware also known as Xonif and FonixCrypter has been active since June 2020 and has been steadily increasing the [...]
  • News
  • Fonix
Posted on January 30, 2021 by Mash

New Pro-Ocean cryptojacking malware targets Apache, Oracle and Redis servers

Pro-Ocean is a new cryptojacking malware by Rocke hackers with self-spreading capabilities, that can blindly throw exploits at discovered vulnerable [...]
  • News
Posted on January 30, 2021 by Mash

DPRK hacking group targets security researchers with Chrome exploit

DPRK group named 'Zinc' or 'Lazarus' has been targeting vulnerability researchers according to Microsoft. According to Microsoft research, the group [...]
  • News
  • Google
  •  
  • Microsoft
Posted on January 29, 2021 by Mash

Google Chrome now blocks 7 additional ports to defend against NAT Slipstreaming vulnerability

Network Address Translation (NAT) is a feature, used to reduce the amount of public IP addresses and to increase security. [...]
  • News
Posted on January 29, 2021 by Mash

New Linux SUDO vulnerability lets local users gain root privileges

Sudo is a Unix program that lets system administrators provide limited root privileges to normal users listed in the sudoers [...]
  • News
Posted on January 27, 2021 by Mash

3 new iOS zero-day vulnerabilities spotted exploited in the wild

Apple has released an update for three recently reported vulnerabilities that allow hackers to elevate privileges and achieve remote code [...]
  • News
  • Apple
Posted on January 27, 2021 by Mash

Third-party fix for NTFS Windows 10 bug got released

OSR, a software development company specializing in Windows internals, has released an open-source filter driver, preventing the NTFS bug abuse, [...]
  • News
Posted on January 26, 2021 by Mash

North Korean hacking group is targeting security researchers

According to Google's Threat Analysis Group report, a North Korean government-backed hacking group is targeting security researchers, attempting to infect [...]
  • News
Posted on January 26, 2021 by Mash

MrbMiner crypto-jacking campaign linked to Iranian software company

Sophos researchers have investigated the brute-force attacks on MSSQL servers with the intent to compromise them and install crypto-mining malware [...]
  • News
Posted on January 24, 2021 by Mash

SonicWall firewall maker hacked using zero-day vulnerability in its VPN device

Security manufacturer SonicWall has issued an urgency notice on threat actors abusing zero-day vulnerability in their Secure Mobile Access (SMA) [...]
  • News
Posted on January 24, 2021 by Mash

Windows Remote Desktop Protocol servers are abused by attackers to amplify DDOS attacks

The Microsoft Remote Desktop Protocol service is a built-in Windows service running on TCP/3389 and/or UDP/3389 that enables authenticated remote [...]
  • News
Posted on January 23, 2021 by Mash

SolarWinds attackers detection evasion mechanism released

Microsoft has shared new details on how hackers behind the SolarWinds breach managed to remain undetected by hiding their activity [...]
  • News
  • SolarWinds
Posted on January 22, 2021 by Mash

Malwarebytes confirms that SolarWinds attackers got access to their internal emails

Malwarebytes CEO Marcin Kleczynski stated that while they don't use SolarWinds, they also got targeted in the recent attack. After [...]
  • News
  • SolarWinds
Posted on January 21, 2021 by Mash

Hackers spy on Signal, Facebook, and Google chat users thanks to logic bug abuse

The logic bugs that attackers used in the past were discovered by Google Project Zero security manager Natalie Silvanovich in [...]
  • News
Posted on January 21, 2021 by Mash

Windows 10 bug causes Blue Screen of Death when user access this location

The new Windows 10 bug causes the system to crash with BSOD by opening a certain path in the browser [...]
  • News
Posted on January 19, 2021 by Mash

Security researchers disclose series of attacks by threat actor of Chinese origin

The recent campaign targeting organizations in Russia and Hong Kong have been linked to Winnti (or APT41) by cybersecurity researchers. [...]
  • News
Posted on January 18, 2021 by Mash

Attackers abuse Windows Finger command to download malware

The Finger command is a utility that allows a local user to get a list of users on a remote [...]
  • News
Posted on January 16, 2021 by Mash

Microsoft warns admins of Windows Zerologon patch enforcement coming next month

Zerologon is a critical security flaw tracked as CVE-2020-1472, which allows attackers to elevate privileges to the domain administrator and [...]
  • News
Posted on January 16, 2021 by Mash

Apple removed a feature that allowed its apps to bypass firewalls and VPNs

The controversial macOS feature that allowed 53 Apple apps to bypass firewalls and VPNs installed by users got removed. The [...]
  • News
  • Apple
Posted on January 16, 2021 by Mash

Verified Twitter accounts hacked in fake Elon Musk crypto giveaway

According to the MalwareHunterTeam security researcher, a big number of verified Twitter accounts got hacked to promote a fake Elon [...]
  • News
  • crypto
  •  
  • Elon Musk
  •  
  • Twitter
Posted on January 16, 2021 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software