Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

JSCEAL Campaign Exploits Fake Crypto Apps in Widespread Malvertising Attack

A new cyber threat campaign dubbed JSCEAL has been uncovered by Check Point Research, targeting cryptocurrency users through deceptive advertisements [...]
  • How-to
Posted on August 6, 2025 by Mash

Lazarus Group Targets Developers with Malware-Infested Fake Open Source Tools

North Korea’s infamous Lazarus Group is now distributing fake open-source software tools laced with malware, shifting its focus from disruption [...]
  • News
Posted on August 5, 2025 by Mash

Cybercriminals Abuse Secure Link Services to Hijack Microsoft 365 Credentials

A hacker group has been exploiting trusted link-wrapping services from companies like Proofpoint and Intermedia to conceal phishing links targeting [...]
  • News
Posted on August 3, 2025 by Mash

CISA Releases Thorium: A New Open-Source Platform for Malware and Forensics

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has publicly launched Thorium, an open-source platform designed to support malware analysis [...]
  • How-to
Posted on August 2, 2025 by Mash

Apple Fixes Actively Exploited Graphics Engine Flaw Affecting Safari and Other Devices

Apple has released urgent security updates to patch CVE-2025-6558, a high-severity vulnerability in the ANGLE graphics engine that was actively [...]
  • News
Posted on July 31, 2025 by Mash

Google's Gemini CLI Vulnerability Allowed Silent Malicious Code Execution

A security flaw in Google's Gemini CLI tool could have let attackers run harmful commands and steal data without detection [...]
  • News
Posted on July 29, 2025 by Mash

Windows 11 2024 Update Now Available for Easy Anti-Cheat Users After Fix

Microsoft has lifted its update block that previously prevented some Easy Anti-Cheat users from installing the Windows 11 2024 Update [...]
  • News
Posted on July 28, 2025 by Mash

Chinese Hackers Exploit SharePoint Flaws to Spread Warlock Ransomware

Microsoft has linked Chinese state-backed groups, Linen Typhoon and Violet Typhoon, to widespread attacks exploiting SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704, and [...]
  • News
Posted on July 26, 2025 by Mash

Coyote Banking Malware Exploits Windows Accessibility Feature for Data Theft

A new version of the Coyote banking trojan is abusing Microsoft’s UI Automation (UIA) framework—a Windows accessibility tool—to detect and [...]
  • News
Posted on July 23, 2025 by Mash

Title: Ivanti Vulnerabilities Exploited to Deploy MDifyLoader and In-Memory Cobalt Strike

Cybersecurity experts have identified a new malware, MDifyLoader, used in attacks targeting Ivanti Connect Secure (ICS) appliances by exploiting two [...]
  • News
Posted on July 21, 2025 by Mash

Cisco Eliminates Hardcoded Root Account in Unified Communications Manager

Cisco has addressed a critical security issue in its Unified Communications Manager (Unified CM) software, removing a hardcoded root SSH [...]
  • News
Posted on July 4, 2025 by Mash

Bluetooth Chip Vulnerabilities Could Allow Hackers to Spy on Calls and Steal Data

Security researchers have identified vulnerabilities in Airoha Bluetooth chips used in at least 29 devices from brands like Bose, Sony, [...]
  • News
Posted on July 1, 2025 by Mash

GIFTEDCROOK Malware Upgraded to Target Sensitive Data in Ukraine

The GIFTEDCROOK malware has evolved from a simple browser credential stealer into a powerful tool aimed at intelligence collection, especially [...]
  • News
Posted on June 30, 2025 by Mash

Brother Printer Vulnerability Exposes Admin Passwords Across Hundreds of Models

A serious security flaw, identified as CVE-2024-51978, affects 689 Brother printer models and 53 more from brands like Fujifilm, Toshiba, [...]
  • News
Posted on June 28, 2025 by Mash

Hackers Exploit ScreenConnect via Authenticode Tampering to Deploy Malware

Cybercriminals are leveraging ConnectWise ScreenConnect installers to spread remote access malware by manipulating hidden configuration data embedded in the file’s [...]
  • News
Posted on June 27, 2025 by Mash

New FileFix Exploit Abuses Windows File Explorer for Stealthy Command Execution

A cybersecurity expert has developed FileFix, an evolution of the ClickFix social engineering attack, that leverages the Windows File Explorer [...]
  • News
Posted on June 26, 2025 by Mash

SparkKitty Malware Found on App Stores Steals Photos and Crypto Wallet Data

A new malware named SparkKitty has been uncovered in apps on both the Google Play Store and Apple App Store, [...]
  • News
Posted on June 25, 2025 by Mash

CoinMarketCap Hit by Supply Chain Hack That Triggered Wallet Drainer Popup

CoinMarketCap recently experienced a supply chain attack that exposed its visitors to a crypto-stealing campaign via a fake Web3 wallet [...]
  • News
Posted on June 24, 2025 by Mash

Microsoft Probes OneDrive Search Glitch Affecting Multiple Platforms

Microsoft is currently investigating a widespread OneDrive issue that causes search results to appear blank or fail to return existing [...]
  • News
Posted on June 22, 2025 by Mash

Godfather Android Malware Evolves with Virtualization to Hijack Banking Apps

A new iteration of the Android malware "Godfather" now uses virtualization to embed banking apps within isolated environments on infected [...]
  • News
Posted on June 21, 2025 by Mash

Windows 11 Brings Back Clock in Calendar Flyout with New Customization Options

After years of user feedback, Microsoft is finally restoring a long-missed Windows 10 feature in Windows 11 — the clock [...]
  • News
Posted on June 17, 2025 by Mash

Trend Micro Patches Critical Flaws in Apex Central and Endpoint Encryption Products

Trend Micro has issued security patches to fix multiple serious vulnerabilities in its Apex Central and Endpoint Encryption PolicyServer tools, [...]
  • News
Posted on June 15, 2025 by Mash

New Secure Boot Vulnerability Lets Hackers Disable Protections and Install Bootkits

A newly discovered flaw, tracked as CVE-2025-3052, allows attackers to bypass Secure Boot on most systems by exploiting a signed [...]
  • News
Posted on June 13, 2025 by Mash

Ivanti Fixes Hardcoded Key Flaws That Risk Exposure of SQL Credentials

Ivanti has issued security patches for three serious vulnerabilities in its Workspace Control (IWC) platform, which stem from hardcoded cryptographic [...]
  • News
Posted on June 12, 2025 by Mash

Destructive npm Packages Disguised as Tools Wipe Developer Projects

Two harmful npm packages, ‘express-api-sync’ and ‘system-health-sync-api’, have been uncovered posing as helpful utilities while secretly containing code to wipe [...]
  • News
Posted on June 9, 2025 by Mash

Critical Roundcube Vulnerability Exploited as Details Go Public

A severe vulnerability in the Roundcube webmail application, tracked as CVE-2025-49113, has been exploited and is now being sold by [...]
  • News
Posted on June 7, 2025 by Mash

Coinbase Data Breach Traced to Bribed TaskUs Support Agents in India

A recent Coinbase data breach has been attributed to support agents in India working for outsourcing firm TaskUs, who were [...]
  • News
Posted on June 5, 2025 by Mash

Qualcomm Patches Actively Exploited Adreno GPU Vulnerabilities

Qualcomm has issued fixes for three zero-day vulnerabilities in its Adreno GPU driver, which are being exploited in targeted cyberattacks. [...]
  • News
Posted on June 3, 2025 by Mash

Critical vBulletin Vulnerabilities Under Active Exploitation by Hackers

Two severe security flaws in vBulletin, identified as CVE-2025-48827 and CVE-2025-48828, are being actively exploited, with one enabling remote code [...]
  • News
Posted on June 1, 2025 by Mash

Phishing Actors Turn to Google Apps Script for Stealthy Credential Theft

Cybercriminals are now using Google Apps Script to host phishing sites that mimic legitimate login pages, aiming to steal user [...]
  • News
Posted on May 31, 2025 by Mash

Windows 11 KB5058499 Brings Smarter Sharing and Click to Do Upgrades

Microsoft’s KB5058499 preview update for Windows 11 version 24H2 introduces 48 new features and improvements, with many rolling out gradually. [...]
  • News
Posted on May 30, 2025 by Mash

DragonForce Targets MSPs Using SimpleHelp in Expanding Ransomware Campaign

The DragonForce ransomware group recently infiltrated a managed service provider (MSP) and leveraged its SimpleHelp remote monitoring platform to access [...]
  • News
Posted on May 29, 2025 by Mash

Malicious NPM Packages Found Harvesting System Data and Posing Risks to Developers

Security researchers from Socket uncovered 60 malicious NPM packages that gather host and network information and transmit it to a [...]
  • News
Posted on May 25, 2025 by Mash

Global Operation Cracks Down on Lumma Malware, Seizes Over 2,000 Domains

A collaborative international operation has significantly disrupted the Lumma malware-as-a-service (MaaS) scheme, taking control of around 2,300 domains used by [...]
  • News
Posted on May 23, 2025 by Mash

Android May Soon Auto-Restart Phones After 3 Days for Enhanced Security

A new feature included in Google Play Services could soon enable Android devices to automatically reboot if left idle for [...]
  • News
Posted on May 22, 2025 by Mash

Fake KeePass Installer Used to Deploy Ransomware via Cobalt Strike

Hackers have been spreading a malicious version of the KeePass password manager for over eight months, using it to steal [...]
  • News
Posted on May 20, 2025 by Mash

'Defendnot' Tool Exploits Windows Feature to Shut Down Microsoft Defender

A newly developed tool called Defendnot can trick Windows into turning off Microsoft Defender by registering a fake antivirus through [...]
  • News
Posted on May 19, 2025 by Mash

Procolored Shipped Malware-Infested Printer Software for Over Six Months

For at least half a year, Procolored unknowingly distributed malware with its printer software, including a remote access trojan (XRedRAT) [...]
  • News
Posted on May 18, 2025 by Mash

Chrome to Auto-Drop Admin Privileges at Launch for Enhanced Security

Google is implementing a security update in Chromium that prevents Chrome from running with administrator rights on Windows, following Microsoft [...]
  • News
Posted on May 16, 2025 by Mash

Ivanti Patches Critical Authentication Bypass in Neurons for ITSM

Ivanti has issued fixes for a severe authentication bypass flaw (CVE-2025-22462) in its Neurons for ITSM platform that could let [...]
  • News
Posted on May 14, 2025 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software