Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Three New Malware Strains Used By SolarWinds Hackers Revealed By Microsoft

Microsoft has revealed the data on malware that SolarWinds hackers deployed as the second-stage payloads. Three new malware strains are [...]
  • News
  • SolarWinds
Posted on March 5, 2021 by Mash

New Backdoor Malware Linked To SolarWinds Hackers Discovered By FireEye

FireEye has discovered a sophisticated backdoor malware on the servers of the organization that got compromised in SolarWinds supply-chain attack. [...]
  • News
  • SolarWinds
Posted on March 5, 2021 by Mash

Creating UI Workflow With Microsoft Power Automate Desktop

Power Automate Desktop is available for all and allows users to create UI workflow fairly easily. To use Power Automate [...]
  • How-to
Posted on March 4, 2021 by Mash

Accellion Zero-day Allows Hackers To Breach Cybersecurity Firm Qualys

Cybersecurity company Qualys has suffered a data breach due to the exploitation of the zero-day vulnerability in their Accellion FTA [...]
  • News
Posted on March 4, 2021 by Mash

Microsoft Fixes Four Zero-day Exchange Vulnerabilities Used In Targeted Attacks

Microsoft has fixed four actively exploited zero-day bugs for Microsoft Exchange. Those four vulnerabilities allowed attackers to gain access to [...]
  • News
Posted on March 3, 2021 by Mash

Hackers Push Malware via Hacked WordPress Sites and Black Hat SEO

Recently Gootkit data stealer has evolved into a complex and stealthy framework and got itself a name Gootloader, which is [...]
  • How-to
Posted on March 2, 2021 by Mash

Project Zero Shares PoC Exploit For Critical RCE Graphics Bug

Google's oday bug-hunting team Project Zero has shared a proof-of-concept (PoC) exploit code for a critical RCE (Remote Code Execution) [...]
  • News
Posted on February 28, 2021 by Mash

Windows 10 Sun Valley Update - What's Coming

Windows 10 'Sun Valley' UI refresh also known as version 21H2 update is reportedly coming to Windows systems in the [...]
  • News
  • Microsoft
  •  
  • Windows
Posted on February 28, 2021 by Mash

New Ryuk Ransomware Variant Can Self-Spread To Other Windows Lan Devices

French Cybersecurity Agency has discovered a new Ryuk ransomware variant with worm-like capabilities that allow it to spread to other [...]
  • News
  • Ryuk
Posted on February 27, 2021 by Mash

Hackers Hijack Gmail Accounts Using Malicious Firefox Extension

Chinese-backed hacking group TA413 is believed to coordinate the recent cyber-espionage campaign targeting Tibetan organizations with malicious Firefox extension with [...]
  • News
Posted on February 27, 2021 by Mash

Microsoft Has Open-Sourced CodeQL Queries To Scan Code For Malicious SolarWinds Implants

Previously Microsoft has disclosed that their systems were compromised in SolarWinds supply-chain attack and allowed attackers to gain access to [...]
  • News
  • SolarWinds
Posted on February 26, 2021 by Mash

North Korean Hackers Target Defense Industry With ThreatNeedle Backdoor

The cyber espionage campaign targeting the defense industry with custom backdoor malware ThreatNeedle to steal sensitive information was coordinated by [...]
  • News
  • Lazarus
  •  
  • ThreadNeedle
Posted on February 26, 2021 by Mash

NASA And The FAA Added To The List Of The SolarWinds Breach Victims

According to Washington Post, NASA and the FAA have also been compromised in the recent SolarWinds supply-chain attack. US government [...]
  • News
  • SolarWinds
Posted on February 25, 2021 by Mash

Vietnam-backed Hacking Group APT32 Target Human Rights Defenders

Vietnam-backed hacking group APT32 has coordinated several attacks against Vietnamese human rights defenders between February and 2018 and November 2020. [...]
  • News
Posted on February 24, 2021 by Mash

Winamp Community Update Project (WACUP) preview released

Winamp community update project was released in 2019, it fixed several bugs and improved Winamp performance through its plugin system. [...]
  • News
Posted on February 23, 2021 by Mash

Chinese Hackers Has Been Using NSA Exploit 3 Years Prior To Shadow Brokers Leak

Chinese state hacking groups have stolen and started using NSA exploit almost 3 years before hacking group Shadow Brokers leaked [...]
  • News
Posted on February 23, 2021 by Mash

MassLogger Windows Credential Stealer Is Back With an Upgrade

MassLogger Windows Credential Stealer has become active again and got an upgrade - now it can steal credentials from Outlook, [...]
  • News
  • MassLogger
Posted on February 20, 2021 by Mash

Payment Processor Ransomware Attack Has Caused Data Breach In Several US Cities

A ransomware attack against the commonly used payment processor ATFS has caused data breaches in several cities and agencies within [...]
  • News
  • Cuba
Posted on February 19, 2021 by Mash

SolarWinds Hackers Acquired Some Azure, Exchange Source Code

Microsoft has announced that SolarWinds hackers managed to download the source code for a limited number of Azure, Intune, and [...]
  • News
  • Azure
  •  
  • Microsoft
  •  
  • SolarWinds
Posted on February 19, 2021 by Mash

Russian Hackers Breach Multiple French IT Providers by Exploiting Old Centreon Software

According to the report by French cybersecurity agency ANSSI, Russian hackers have successfully managed to exploit Centreon Software to infiltrate [...]
  • News
  • Centreon
Posted on February 18, 2021 by Mash

Telegram's privacy feature failed to delete self-destructing video files

Telegram's 'Secret chat' feature offers increased privacy than the standard chats. Security researcher Dhiraj Mishra has discovered a vulnerability in [...]
  • News
  • Telegram
Posted on February 17, 2021 by Mash

Android spyware strains connected to state-sponsored hacking group

According to cybersecurity firm Lookout, two malware strains dubbed Hornbill and SunBird, have been linked to Confucius hacking group, which [...]
  • News
Posted on February 13, 2021 by Mash

Copycats imitate novel supply chain attack

A recent supply chain attack was done by security researcher Alex Birsan, who managed to infiltrate 35 big tech companies [...]
  • News
Posted on February 13, 2021 by Mash

Avaddon ransomware fixes free decryption flaw

Avaddon ransomware gang has fixed a flaw that allowed victims to recover their files without paying a ransom, which was [...]
  • News
  • Avaddon
  •  
  • ransomware
Posted on February 12, 2021 by Mash

BazarBackdoor malware has been rewritten in Nim to evade antivirus

TrickBot's BazarBackdoor has been actively distributed through spam campaigns. BazarBackdoor allows hackers to get remote access to the computer to spread [...]
  • News
  • BazarBackdoor
  •  
  • TrickBot
Posted on February 12, 2021 by Mash

Microsoft fixed bug allowing attackers to trigger BSOD crashes

The bug that lets attackers crash Windows 10 by creating specific downloads, the system would crash once the folder is [...]
  • How-to
  • Microsoft
  •  
  • Windows
Posted on February 11, 2021 by Mash

Microsoft forces secure RPC to address Zerologon attacks

Zerologon is a critical Netlogon Windows server process security flow that allows hackers to elevate privileges to domain administrators and [...]
  • News
  • Windows
  •  
  • Zerologon
Posted on February 11, 2021 by Mash

CD Projekt Red got hit with HelloKitty ransomware, source code stolen

CD Projekt Red has disclosed that they were a target of a cyberattack of a ransomware attack and got their [...]
  • News
  • CDPR
  •  
  • HelloKitty
  •  
  • ransomware
Posted on February 11, 2021 by Mash

Hackers gained access to Oldsmar water treatment system, attempted to poison the town

Last Friday hackers managed to breach the water facility for the city of Oldsmar, Florida and attempted to increase the [...]
  • News
Posted on February 9, 2021 by Mash

Phishing campaign uses Morse code to hide malicious URLs

Recent phishing campaign has surprised security researchers by utilizing Morse code to bypass security mail getaways and mail filters. This [...]
  • News
Posted on February 8, 2021 by Mash

Mozilla releases Firefox 85.0.1, fixes Windows 10 NTFS corruption bug

Mozilla has fixed a recently reported bug that allowed non-privileged users to mark an NTFS volume as dirty. That caused [...]
  • News
Posted on February 7, 2021 by Mash

Malicious extension steals user data by abusing the Chrome sync feature

Chrome sync is a browser feature that automatically synchronizes user's bookmarks, history, passwords, and other settings after they log in [...]
  • News
  • chrome
Posted on February 6, 2021 by Mash

Fake WhatsApp app allows hackers to spy on iPhone users

Cybersecurity researchers at Citizen Lab and journalists at Motherboard has spotted a fake WhatsApp app, linked to an Italian company [...]
  • News
  • WhatsApp
Posted on February 6, 2021 by Mash

StormShield cybersecurity company got hacked, firewall source code stolen

Leading French cybersecurity firm StormShield has disclosed that their systems got hacked, resulting in a threat actor being able to [...]
  • News
  • StormShield
Posted on February 5, 2021 by Mash

Chrome zero-day exploited in the wild has been fixed

Google has addressed zero-day vulnerability for Chrome version 88.0.4324.150 that has been actively exploited recently. The vulnerability has been tracked [...]
  • News
Posted on February 5, 2021 by Mash

Cisco has fixed critical code execution bugs in SMB VPN routers

Cisco has addressed pre-auth remote code execution (RCE) vulnerabilities affecting several VPN routers Those vulnerabilities allowed attackers to execute arbitrary [...]
  • News
Posted on February 4, 2021 by Mash

Chrome updates detected as backdoors by Microsoft Defender

Microsoft Defender detects Chrome updates as PHP backdoors because of the Slovenian localization file bundled with the Chrome installer. The [...]
  • News
Posted on February 4, 2021 by Mash

SonicWall SMA 100 zero-day vulnerability exploited in the wild

According to the report by cybersecurity company NCC Group, SonicWall zero-day exploit has been used in the wild. NCC Group [...]
  • News
  • SonicWall
Posted on February 2, 2021 by Mash

Malicious Home Depot ad gets placed as a top Google search result

There has been a lot of different campaigns using malicious ads in the past. The ads disguised themselves as the [...]
  • News
Posted on January 31, 2021 by Mash

Fonix ransomware shuts down their operations, releases master decryption key

Fonix ransomware also known as Xonif and FonixCrypter has been active since June 2020 and has been steadily increasing the [...]
  • News
  • Fonix
Posted on January 30, 2021 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software