Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Fake TradingView Ads Spread Advanced Brokewell Malware on Android

Hackers are exploiting Meta’s ad network with fraudulent promotions of a free TradingView Premium app that secretly installs the Brokewell [...]
  • News
Posted on September 2, 2025 by Mash

Microsoft Begins Testing Windows 11 Version 25H2 in Release Preview

Microsoft has moved Windows 11 version 25H2 to the Release Preview Channel, the final stage before its full rollout later [...]
  • News
Posted on September 2, 2025 by Mash

Popular Chrome VPN Extension Found Secretly Spying on Users With Hidden Screenshots

Researchers have uncovered that the Chrome extension FreeVPN.One, installed over 100,000 times and even labeled as “featured” in the Chrome [...]
  • News
Posted on September 1, 2025 by Mash

Malicious PDF Editor Campaign Spreads TamperedChef Infostealer via Google Ads

Cybercriminals are distributing the TamperedChef information-stealing malware by promoting a fake PDF editing tool called AppSuite PDF Editor through Google [...]
  • News
Posted on September 1, 2025 by Mash

Windows 11 KB5064081 Preview Update Brings Task Manager Fixes and New Features

Microsoft has released the Windows 11 KB5064081 preview cumulative update for version 24H2, introducing 36 features and changes. As part [...]
  • News
Posted on August 31, 2025 by Mash

Thousands of Citrix Systems at Risk from Actively Exploited RCE Vulnerability

Over 28,000 Citrix NetScaler ADC and Gateway devices remain exposed to a critical remote code execution flaw (CVE-2025-7775) that is [...]
  • News
Posted on August 29, 2025 by Mash

Google Expands Developer Identity Checks to Strengthen Android Security

Google is rolling out a new security initiative called Developer Verification to reduce malware risks, especially from sideloaded apps obtained [...]
  • News
Posted on August 28, 2025 by Mash

Google Patches Gemini CLI Flaw That Enabled Hidden Code Execution

A critical security issue in Google’s Gemini CLI tool allowed attackers to stealthily run malicious commands and steal data through [...]
  • News
Posted on August 27, 2025 by Mash

Title: Fake FSB Antivirus App Spreads New Android Spyware

A newly discovered Android spyware, tracked as Android.Backdoor.916.origin, is masquerading as an antivirus allegedly from Russia’s Federal Security Service (FSB) [...]
  • News
Posted on August 26, 2025 by Mash

New ‘Shamos’ Malware Poses as Mac Fixes to Steal Sensitive Data

A newly discovered Mac malware named Shamos is being spread through deceptive ClickFix attacks that disguise themselves as troubleshooting guides [...]
  • News
Posted on August 24, 2025 by Mash

Microsoft Edge’s New ‘Journeys’ AI Summaries May Cost $20 a Month

Microsoft is experimenting with a new Edge feature called Journeys, designed to transform browsing history into organized summaries. However, early [...]
  • News
Posted on August 23, 2025 by Mash

Perplexity’s Comet AI Browser Found Susceptible to Online Scams

A new study has shown that agentic AI browsers, which can independently shop, book tickets, and manage accounts, are highly [...]
  • News
Posted on August 22, 2025 by Mash

Ollama Desktop Bug Exposed Users to Silent Drive-By Attacks

A critical flaw in Ollama Desktop v0.10.0, an open-source tool for running large language models locally, allowed attackers to hijack [...]
  • News
Posted on August 20, 2025 by Mash

Embassies in South Korea Targeted by XenoRAT Espionage Campaign

A newly uncovered cyber-espionage campaign has been targeting foreign embassies in South Korea with the XenoRAT malware, delivered through malicious [...]
  • News
Posted on August 20, 2025 by Mash

Plex Urges Immediate Update to Fix Newly Discovered Security Flaw

Plex has warned users to quickly update their Plex Media Server after patching a recently reported security issue affecting versions [...]
  • News
Posted on August 17, 2025 by Mash

Phishing Campaign Exploits Unicode Character to Mimic Booking.com Links

Cybercriminals are using the Japanese hiragana character "ん" to make malicious URLs look like legitimate Booking.com addresses, taking advantage of [...]
  • News
Posted on August 16, 2025 by Mash

PS1Bot Malware Spreads via Malvertising in Stealthy Multi-Stage Attacks

Security experts have uncovered a new malvertising campaign delivering PS1Bot, a modular malware framework capable of keylogging, data theft, reconnaissance, [...]
  • News
Posted on August 15, 2025 by Mash

Critical FortiSIEM Security Flaw Actively Exploited, Patch Urgently Needed

Fortinet has issued an urgent warning about a critical remote command injection vulnerability (CVE-2025-25256, CVSS 9.8) in FortiSIEM, a widely [...]
  • News
Posted on August 15, 2025 by Mash

Windows 11 24H2 Update Hits WSUS Users with Installation Failures

The KB5063878 cumulative update for Windows 11 24H2, released earlier this week, is failing to install for many systems using [...]
  • News
Posted on August 15, 2025 by Mash

Hackers Claim to Breach and Leak Data from North Korea’s Kimsuky Group

Two hackers, calling themselves "Saber" and "cyb0rg," allege they infiltrated the North Korean state-backed cyber group Kimsuky and released nearly [...]
  • News
Posted on August 13, 2025 by Mash

Firefox’s New Smart Tab Grouping Feature Linked to High CPU and Battery Usage

Mozilla’s Firefox 141 introduced Smart Tab Grouping, an AI-powered tool designed to help users organize tabs locally without compromising privacy. [...]
  • News
Posted on August 12, 2025 by Mash

Google Acknowledges Salesforce Breach Exposing Potential Ads Clients’ Details

Google has confirmed a security incident involving one of its Salesforce CRM systems that exposed information of potential Google Ads [...]
  • News
Posted on August 11, 2025 by Mash

New EDR-Killing Malware Shared by Multiple Ransomware Groups

A new Endpoint Detection and Response (EDR) disabling tool, believed to be an upgraded version of "EDRKillShifter" created by RansomHub, [...]
  • News
Posted on August 10, 2025 by Mash

Dell Patches “ReVault” ControlVault3 Flaws Allowing Login Bypass and Persistent Malware

Security researchers from Cisco Talos have uncovered five “ReVault” vulnerabilities in Dell’s ControlVault3 firmware and Windows APIs, affecting over 100 [...]
  • News
Posted on August 8, 2025 by Mash

Adobe Rushes to Patch Critical AEM Forms Zero-Days After Exploit Release

Adobe has issued urgent patches for two critical zero-day vulnerabilities in Adobe Experience Manager (AEM) Forms on JEE after researchers [...]
  • News
Posted on August 7, 2025 by Mash

JSCEAL Campaign Exploits Fake Crypto Apps in Widespread Malvertising Attack

A new cyber threat campaign dubbed JSCEAL has been uncovered by Check Point Research, targeting cryptocurrency users through deceptive advertisements [...]
  • How-to
Posted on August 6, 2025 by Mash

Lazarus Group Targets Developers with Malware-Infested Fake Open Source Tools

North Korea’s infamous Lazarus Group is now distributing fake open-source software tools laced with malware, shifting its focus from disruption [...]
  • News
Posted on August 5, 2025 by Mash

Cybercriminals Abuse Secure Link Services to Hijack Microsoft 365 Credentials

A hacker group has been exploiting trusted link-wrapping services from companies like Proofpoint and Intermedia to conceal phishing links targeting [...]
  • News
Posted on August 3, 2025 by Mash

CISA Releases Thorium: A New Open-Source Platform for Malware and Forensics

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has publicly launched Thorium, an open-source platform designed to support malware analysis [...]
  • How-to
Posted on August 2, 2025 by Mash

Apple Fixes Actively Exploited Graphics Engine Flaw Affecting Safari and Other Devices

Apple has released urgent security updates to patch CVE-2025-6558, a high-severity vulnerability in the ANGLE graphics engine that was actively [...]
  • News
Posted on July 31, 2025 by Mash

Google's Gemini CLI Vulnerability Allowed Silent Malicious Code Execution

A security flaw in Google's Gemini CLI tool could have let attackers run harmful commands and steal data without detection [...]
  • News
Posted on July 29, 2025 by Mash

Windows 11 2024 Update Now Available for Easy Anti-Cheat Users After Fix

Microsoft has lifted its update block that previously prevented some Easy Anti-Cheat users from installing the Windows 11 2024 Update [...]
  • News
Posted on July 28, 2025 by Mash

Chinese Hackers Exploit SharePoint Flaws to Spread Warlock Ransomware

Microsoft has linked Chinese state-backed groups, Linen Typhoon and Violet Typhoon, to widespread attacks exploiting SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704, and [...]
  • News
Posted on July 26, 2025 by Mash

Coyote Banking Malware Exploits Windows Accessibility Feature for Data Theft

A new version of the Coyote banking trojan is abusing Microsoft’s UI Automation (UIA) framework—a Windows accessibility tool—to detect and [...]
  • News
Posted on July 23, 2025 by Mash

Title: Ivanti Vulnerabilities Exploited to Deploy MDifyLoader and In-Memory Cobalt Strike

Cybersecurity experts have identified a new malware, MDifyLoader, used in attacks targeting Ivanti Connect Secure (ICS) appliances by exploiting two [...]
  • News
Posted on July 21, 2025 by Mash

Cisco Eliminates Hardcoded Root Account in Unified Communications Manager

Cisco has addressed a critical security issue in its Unified Communications Manager (Unified CM) software, removing a hardcoded root SSH [...]
  • News
Posted on July 4, 2025 by Mash

Bluetooth Chip Vulnerabilities Could Allow Hackers to Spy on Calls and Steal Data

Security researchers have identified vulnerabilities in Airoha Bluetooth chips used in at least 29 devices from brands like Bose, Sony, [...]
  • News
Posted on July 1, 2025 by Mash

GIFTEDCROOK Malware Upgraded to Target Sensitive Data in Ukraine

The GIFTEDCROOK malware has evolved from a simple browser credential stealer into a powerful tool aimed at intelligence collection, especially [...]
  • News
Posted on June 30, 2025 by Mash

Brother Printer Vulnerability Exposes Admin Passwords Across Hundreds of Models

A serious security flaw, identified as CVE-2024-51978, affects 689 Brother printer models and 53 more from brands like Fujifilm, Toshiba, [...]
  • News
Posted on June 28, 2025 by Mash

Hackers Exploit ScreenConnect via Authenticode Tampering to Deploy Malware

Cybercriminals are leveraging ConnectWise ScreenConnect installers to spread remote access malware by manipulating hidden configuration data embedded in the file’s [...]
  • News
Posted on June 27, 2025 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software