Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Embassies in South Korea Targeted by XenoRAT Espionage Campaign

A newly uncovered cyber-espionage campaign has been targeting foreign embassies in South Korea with the XenoRAT malware, delivered through malicious [...]
  • News
Posted on August 20, 2025 by Mash

Plex Urges Immediate Update to Fix Newly Discovered Security Flaw

Plex has warned users to quickly update their Plex Media Server after patching a recently reported security issue affecting versions [...]
  • News
Posted on August 17, 2025 by Mash

Phishing Campaign Exploits Unicode Character to Mimic Booking.com Links

Cybercriminals are using the Japanese hiragana character "ん" to make malicious URLs look like legitimate Booking.com addresses, taking advantage of [...]
  • News
Posted on August 16, 2025 by Mash

PS1Bot Malware Spreads via Malvertising in Stealthy Multi-Stage Attacks

Security experts have uncovered a new malvertising campaign delivering PS1Bot, a modular malware framework capable of keylogging, data theft, reconnaissance, [...]
  • News
Posted on August 15, 2025 by Mash

Critical FortiSIEM Security Flaw Actively Exploited, Patch Urgently Needed

Fortinet has issued an urgent warning about a critical remote command injection vulnerability (CVE-2025-25256, CVSS 9.8) in FortiSIEM, a widely [...]
  • News
Posted on August 15, 2025 by Mash

Windows 11 24H2 Update Hits WSUS Users with Installation Failures

The KB5063878 cumulative update for Windows 11 24H2, released earlier this week, is failing to install for many systems using [...]
  • News
Posted on August 15, 2025 by Mash

Hackers Claim to Breach and Leak Data from North Korea’s Kimsuky Group

Two hackers, calling themselves "Saber" and "cyb0rg," allege they infiltrated the North Korean state-backed cyber group Kimsuky and released nearly [...]
  • News
Posted on August 13, 2025 by Mash

Firefox’s New Smart Tab Grouping Feature Linked to High CPU and Battery Usage

Mozilla’s Firefox 141 introduced Smart Tab Grouping, an AI-powered tool designed to help users organize tabs locally without compromising privacy. [...]
  • News
Posted on August 12, 2025 by Mash

Google Acknowledges Salesforce Breach Exposing Potential Ads Clients’ Details

Google has confirmed a security incident involving one of its Salesforce CRM systems that exposed information of potential Google Ads [...]
  • News
Posted on August 11, 2025 by Mash

New EDR-Killing Malware Shared by Multiple Ransomware Groups

A new Endpoint Detection and Response (EDR) disabling tool, believed to be an upgraded version of "EDRKillShifter" created by RansomHub, [...]
  • News
Posted on August 10, 2025 by Mash

Dell Patches “ReVault” ControlVault3 Flaws Allowing Login Bypass and Persistent Malware

Security researchers from Cisco Talos have uncovered five “ReVault” vulnerabilities in Dell’s ControlVault3 firmware and Windows APIs, affecting over 100 [...]
  • News
Posted on August 8, 2025 by Mash

Adobe Rushes to Patch Critical AEM Forms Zero-Days After Exploit Release

Adobe has issued urgent patches for two critical zero-day vulnerabilities in Adobe Experience Manager (AEM) Forms on JEE after researchers [...]
  • News
Posted on August 7, 2025 by Mash

JSCEAL Campaign Exploits Fake Crypto Apps in Widespread Malvertising Attack

A new cyber threat campaign dubbed JSCEAL has been uncovered by Check Point Research, targeting cryptocurrency users through deceptive advertisements [...]
  • How-to
Posted on August 6, 2025 by Mash

Lazarus Group Targets Developers with Malware-Infested Fake Open Source Tools

North Korea’s infamous Lazarus Group is now distributing fake open-source software tools laced with malware, shifting its focus from disruption [...]
  • News
Posted on August 5, 2025 by Mash

Cybercriminals Abuse Secure Link Services to Hijack Microsoft 365 Credentials

A hacker group has been exploiting trusted link-wrapping services from companies like Proofpoint and Intermedia to conceal phishing links targeting [...]
  • News
Posted on August 3, 2025 by Mash

CISA Releases Thorium: A New Open-Source Platform for Malware and Forensics

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has publicly launched Thorium, an open-source platform designed to support malware analysis [...]
  • How-to
Posted on August 2, 2025 by Mash

Apple Fixes Actively Exploited Graphics Engine Flaw Affecting Safari and Other Devices

Apple has released urgent security updates to patch CVE-2025-6558, a high-severity vulnerability in the ANGLE graphics engine that was actively [...]
  • News
Posted on July 31, 2025 by Mash

Google's Gemini CLI Vulnerability Allowed Silent Malicious Code Execution

A security flaw in Google's Gemini CLI tool could have let attackers run harmful commands and steal data without detection [...]
  • News
Posted on July 29, 2025 by Mash

Windows 11 2024 Update Now Available for Easy Anti-Cheat Users After Fix

Microsoft has lifted its update block that previously prevented some Easy Anti-Cheat users from installing the Windows 11 2024 Update [...]
  • News
Posted on July 28, 2025 by Mash

Chinese Hackers Exploit SharePoint Flaws to Spread Warlock Ransomware

Microsoft has linked Chinese state-backed groups, Linen Typhoon and Violet Typhoon, to widespread attacks exploiting SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704, and [...]
  • News
Posted on July 26, 2025 by Mash

Coyote Banking Malware Exploits Windows Accessibility Feature for Data Theft

A new version of the Coyote banking trojan is abusing Microsoft’s UI Automation (UIA) framework—a Windows accessibility tool—to detect and [...]
  • News
Posted on July 23, 2025 by Mash

Title: Ivanti Vulnerabilities Exploited to Deploy MDifyLoader and In-Memory Cobalt Strike

Cybersecurity experts have identified a new malware, MDifyLoader, used in attacks targeting Ivanti Connect Secure (ICS) appliances by exploiting two [...]
  • News
Posted on July 21, 2025 by Mash

Cisco Eliminates Hardcoded Root Account in Unified Communications Manager

Cisco has addressed a critical security issue in its Unified Communications Manager (Unified CM) software, removing a hardcoded root SSH [...]
  • News
Posted on July 4, 2025 by Mash

Bluetooth Chip Vulnerabilities Could Allow Hackers to Spy on Calls and Steal Data

Security researchers have identified vulnerabilities in Airoha Bluetooth chips used in at least 29 devices from brands like Bose, Sony, [...]
  • News
Posted on July 1, 2025 by Mash

GIFTEDCROOK Malware Upgraded to Target Sensitive Data in Ukraine

The GIFTEDCROOK malware has evolved from a simple browser credential stealer into a powerful tool aimed at intelligence collection, especially [...]
  • News
Posted on June 30, 2025 by Mash

Brother Printer Vulnerability Exposes Admin Passwords Across Hundreds of Models

A serious security flaw, identified as CVE-2024-51978, affects 689 Brother printer models and 53 more from brands like Fujifilm, Toshiba, [...]
  • News
Posted on June 28, 2025 by Mash

Hackers Exploit ScreenConnect via Authenticode Tampering to Deploy Malware

Cybercriminals are leveraging ConnectWise ScreenConnect installers to spread remote access malware by manipulating hidden configuration data embedded in the file’s [...]
  • News
Posted on June 27, 2025 by Mash

New FileFix Exploit Abuses Windows File Explorer for Stealthy Command Execution

A cybersecurity expert has developed FileFix, an evolution of the ClickFix social engineering attack, that leverages the Windows File Explorer [...]
  • News
Posted on June 26, 2025 by Mash

SparkKitty Malware Found on App Stores Steals Photos and Crypto Wallet Data

A new malware named SparkKitty has been uncovered in apps on both the Google Play Store and Apple App Store, [...]
  • News
Posted on June 25, 2025 by Mash

CoinMarketCap Hit by Supply Chain Hack That Triggered Wallet Drainer Popup

CoinMarketCap recently experienced a supply chain attack that exposed its visitors to a crypto-stealing campaign via a fake Web3 wallet [...]
  • News
Posted on June 24, 2025 by Mash

Microsoft Probes OneDrive Search Glitch Affecting Multiple Platforms

Microsoft is currently investigating a widespread OneDrive issue that causes search results to appear blank or fail to return existing [...]
  • News
Posted on June 22, 2025 by Mash

Godfather Android Malware Evolves with Virtualization to Hijack Banking Apps

A new iteration of the Android malware "Godfather" now uses virtualization to embed banking apps within isolated environments on infected [...]
  • News
Posted on June 21, 2025 by Mash

Windows 11 Brings Back Clock in Calendar Flyout with New Customization Options

After years of user feedback, Microsoft is finally restoring a long-missed Windows 10 feature in Windows 11 — the clock [...]
  • News
Posted on June 17, 2025 by Mash

Trend Micro Patches Critical Flaws in Apex Central and Endpoint Encryption Products

Trend Micro has issued security patches to fix multiple serious vulnerabilities in its Apex Central and Endpoint Encryption PolicyServer tools, [...]
  • News
Posted on June 15, 2025 by Mash

New Secure Boot Vulnerability Lets Hackers Disable Protections and Install Bootkits

A newly discovered flaw, tracked as CVE-2025-3052, allows attackers to bypass Secure Boot on most systems by exploiting a signed [...]
  • News
Posted on June 13, 2025 by Mash

Ivanti Fixes Hardcoded Key Flaws That Risk Exposure of SQL Credentials

Ivanti has issued security patches for three serious vulnerabilities in its Workspace Control (IWC) platform, which stem from hardcoded cryptographic [...]
  • News
Posted on June 12, 2025 by Mash

Destructive npm Packages Disguised as Tools Wipe Developer Projects

Two harmful npm packages, ‘express-api-sync’ and ‘system-health-sync-api’, have been uncovered posing as helpful utilities while secretly containing code to wipe [...]
  • News
Posted on June 9, 2025 by Mash

Critical Roundcube Vulnerability Exploited as Details Go Public

A severe vulnerability in the Roundcube webmail application, tracked as CVE-2025-49113, has been exploited and is now being sold by [...]
  • News
Posted on June 7, 2025 by Mash

Coinbase Data Breach Traced to Bribed TaskUs Support Agents in India

A recent Coinbase data breach has been attributed to support agents in India working for outsourcing firm TaskUs, who were [...]
  • News
Posted on June 5, 2025 by Mash

Qualcomm Patches Actively Exploited Adreno GPU Vulnerabilities

Qualcomm has issued fixes for three zero-day vulnerabilities in its Adreno GPU driver, which are being exploited in targeted cyberattacks. [...]
  • News
Posted on June 3, 2025 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software