Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Windows NTLM Hash Leak Bug Actively Exploited in Government-Targeted Phishing Campaigns

A Windows flaw (CVE-2025-24054) allowing NTLM hash leakage through .library-ms files is now being actively used in phishing attacks against [...]
  • News
Posted on April 19, 2025 by Mash

Apple Patches Two New Zero-Days Used in Advanced iPhone Attacks

Apple has released urgent security updates to fix two newly discovered zero-day vulnerabilities that were exploited in highly targeted iPhone [...]
  • News
Posted on April 18, 2025 by Mash

Russian APT29 Unleashes Stealthy GrapeLoader in Phishing Attacks on European Embassies

Russian-backed hacking group Midnight Blizzard (also known as APT29 or Cozy Bear) is behind a spear-phishing campaign targeting European diplomatic [...]
  • News
Posted on April 17, 2025 by Mash

Crypto-Stealing Malware Found Preloaded on Budget Android Phones

Researchers from Doctor Web have uncovered a malware campaign in which low-cost Android phones come pre-infected with spyware designed to [...]
  • News
Posted on April 16, 2025 by Mash

Tycoon2FA Upgrades Make Microsoft 365 Phishing Attacks Harder to Detect

The Tycoon2FA phishing-as-a-service platform has received updates that enhance its ability to evade detection while targeting Microsoft 365 and Gmail [...]
  • News
Posted on April 14, 2025 by Mash

OttoKit Plugin Flaw Exploited Within Hours of Public Disclosure

Hackers began taking advantage of a serious authentication bypass vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin just hours after [...]
  • News
Posted on April 12, 2025 by Mash

Windows Hello Login Problems Triggered by April 2025 Update

Microsoft has acknowledged that the April 2025 cumulative update (KB5055523) may cause Windows Hello to malfunction on certain devices, particularly [...]
  • News
Posted on April 10, 2025 by Mash

Malicious VSCode Add-ons Used to Secretly Mine Cryptocurrency on Windows

Nine fake Visual Studio Code extensions were found on Microsoft's VSCode Marketplace, posing as legitimate tools while secretly infecting users [...]
  • News
Posted on April 9, 2025 by Mash

Hackers Use Hidden WordPress Plugins to Secretly Run Malicious Code

Cybercriminals are increasingly abusing WordPress's mu-plugins (Must-Use Plugins) directory to stealthily execute harmful code on every page without being easily [...]
  • News
Posted on April 7, 2025 by Mash

New WinRAR Vulnerability Allows Attackers to Bypass Windows Security Prompts

A recently discovered flaw in WinRAR, identified as CVE-2025-31334, enables attackers to bypass the Windows "Mark of the Web" (MotW) [...]
  • News
Posted on April 6, 2025 by Mash

Cybersecurity Agencies Urge Action Against Fast Flux DNS Techniques

CISA, alongside the FBI, NSA, and international partners, is warning about the persistent threat of Fast Flux, a DNS evasion [...]
  • News
Posted on April 4, 2025 by Mash

Mozilla Urges Windows Users to Update Firefox Due to Critical Sandbox Escape Flaw

Mozilla has rolled out Firefox 136.0.4 to fix a serious security vulnerability (CVE-2025-2857) that allows attackers to break out of [...]
  • News
Posted on March 29, 2025 by Mash

New Windows Zero-Day Exposes NTLM Hashes, Gets Temporary Fix

A newly discovered Windows zero-day vulnerability allows remote attackers to steal NTLM hashes by tricking users into simply viewing malicious [...]
  • How-to
Posted on March 27, 2025 by Mash

VanHelsing Ransomware Targets Multiple Platforms with Advanced Stealth

A new ransomware operation, VanHelsing, has surfaced as a multi-platform RaaS (Ransomware-as-a-Service), attacking Windows, Linux, BSD, ARM, and ESXi systems. [...]
  • News
Posted on March 26, 2025 by Mash

FBI Confirms Fake File Converters Are Spreading Malware

The FBI warns that cybercriminals are using fake online document converters to distribute malware, steal sensitive data, and even launch [...]
  • News
Posted on March 25, 2025 by Mash

Hackers Exploit Microsoft Trusted Signing to Sign Malware

Cybercriminals are misusing Microsoft’s Trusted Signing service to code-sign malware using short-lived three-day certificates, making malicious files appear legitimate. Code-signing [...]
  • News
Posted on March 24, 2025 by Mash

Hackers Now Exploiting Critical Cisco Smart Licensing Utility Flaws

Cybercriminals have begun attacking unpatched Cisco Smart Licensing Utility (CSLU) instances by exploiting a vulnerability that provides access to a [...]
  • News
Posted on March 22, 2025 by Mash

DollyWay Malware Campaign Hijacks 20,000 WordPress Sites for Redirection Scams

Since 2016, the DollyWay malware campaign has compromised over 20,000 WordPress sites worldwide, redirecting visitors to fraudulent pages promoting scams [...]
  • News
Posted on March 20, 2025 by Mash

Windows Zero-Day Exploited by State Hackers Since 2017, Microsoft Yet to Patch

At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been using a newly discovered Windows [...]
  • News
  • Windows
Posted on March 19, 2025 by Mash

March Windows Update Accidentally Removes Copilot from Some Systems

Microsoft has confirmed that the March 2025 cumulative updates for Windows 10 and Windows 11 mistakenly uninstall the Copilot digital [...]
  • News
Posted on March 19, 2025 by Mash

Fake Adobe and DocuSign OAuth Apps Target Microsoft 365 Users

Cybercriminals are using deceptive Microsoft OAuth apps disguised as Adobe and DocuSign tools to spread malware and steal Microsoft 365 [...]
  • News
Posted on March 18, 2025 by Mash

Microsoft Apologizes for Wrongly Removing Popular VSCode Extensions

Microsoft has restored the ‘Material Theme – Free’ and ‘Material Theme Icons – Free’ extensions on the Visual Studio Marketplace [...]
  • News
Posted on March 14, 2025 by Mash

Facebook Warns of Actively Exploited FreeType 2 Vulnerability

Facebook has disclosed a critical FreeType vulnerability (CVE-2025-27363) that can enable arbitrary code execution and has reportedly been exploited in [...]
  • News
Posted on March 13, 2025 by Mash

Unpatched Edimax IP Camera Flaw Exploited in Botnet Attacks

A critical command injection vulnerability (CVE-2025-1316) in the Edimax IC-7100 IP camera is actively being exploited by botnet malware to [...]
  • News
Posted on March 10, 2025 by Mash

YouTubers Blackmailed with Copyright Strikes to Distribute Malware

Cybercriminals are falsely claiming copyright ownership of Windows Packet Divert (WPD) tools to pressure YouTube creators into spreading malware and [...]
  • News
Posted on March 10, 2025 by Mash

Eleven11bot Botnet Infects 86,000 IoT Devices for Large-Scale DDoS Attacks

A new botnet called Eleven11bot has compromised over 86,000 IoT devices, mainly security cameras and network video recorders (NVRs), to [...]
  • News
Posted on March 6, 2025 by Mash

Vo1d Botnet Expands to Nearly 1.6 Million Android TVs Worldwide

A new strain of the Vo1d malware botnet has infected nearly 1.6 million Android TV devices across 226 countries, integrating [...]
  • News
Posted on March 1, 2025 by Mash

GrassCall Malware Drains Crypto Wallets Through Fake Job Interviews

A social engineering scam has been targeting job seekers in the Web3 industry using a fraudulent "GrassCall" meeting app that [...]
  • News
Posted on February 27, 2025 by Mash

GitVenom Exploits GitHub to Distribute Malware and Steal Crypto

A malware campaign known as GitVenom has been using hundreds of fake GitHub repositories to spread info-stealers, remote access trojans [...]
  • News
Posted on February 27, 2025 by Mash

Microsoft Tests Ad-Supported Office Apps with Limited Features

Microsoft is experimenting with ad-supported versions of its Office desktop apps, allowing users to edit documents with restricted functionality. Unlike [...]
  • News
Posted on February 26, 2025 by Mash

PayPal "New Address" Scam Exploits Platform to Send Phishing Emails

A new phishing scam is abusing PayPal’s address settings to send fraudulent purchase confirmations, tricking users into calling scammers who [...]
  • News
Posted on February 24, 2025 by Mash

Google Chrome Begins Disabling uBlock Origin Amid Manifest V3 Rollout

Google is continuing its phased deprecation of Manifest V2-based extensions, including the popular ad blocker uBlock Origin, as part of [...]
  • News
Posted on February 23, 2025 by Mash

Chinese Hackers Exploit Custom Malware to Spy on U.S. Telecom Networks

The Chinese state-sponsored hacking group Salt Typhoon has been using a custom tool called JumbledPath to covertly monitor network traffic [...]
  • News
Posted on February 22, 2025 by Mash

Chinese Hackers Exploit Microsoft APP-V Tool to Bypass Antivirus

The Chinese APT group "Mustang Panda," also known as Earth Preta, has been abusing Microsoft's Application Virtualization Injector (MAVInject.exe) to [...]
  • News
Posted on February 20, 2025 by Mash

Microsoft Phases Out Location History Feature in Windows

Microsoft is removing the Location History feature from Windows, which previously allowed apps like Cortana to access stored location data [...]
  • News
Posted on February 19, 2025 by Mash

Google Chrome Introduces AI-Enhanced Security for Real-Time Protection

Google Chrome has upgraded its "Enhanced Protection" feature with AI to provide real-time security against malicious websites, downloads, and extensions. [...]
  • News
Posted on February 17, 2025 by Mash

PostgreSQL Zero-Day Exploited in BeyondTrust Cyberattack

Security researchers from Rapid7 revealed that attackers used a previously unknown PostgreSQL vulnerability (CVE-2025-1094) as a zero-day to exploit BeyondTrust’s [...]
  • News
Posted on February 15, 2025 by Mash

whoAMI Attack Exploits AMI Name Confusion to Hijack AWS EC2 Instances

Security researchers at DataDog uncovered a vulnerability called "whoAMI," which lets attackers gain code execution in AWS accounts by publishing [...]
  • News
Posted on February 14, 2025 by Mash

Hackers Ramp Up Attacks on Outdated ThinkPHP and ownCloud Flaws

Hackers are increasingly targeting unpatched systems vulnerable to older security flaws, specifically CVE-2022-47945 in ThinkPHP and CVE-2023-49103 in ownCloud. The [...]
  • News
Posted on February 13, 2025 by Mash

Apple Patches Zero-Day Exploited in Sophisticated Attacks

Apple has issued urgent security updates to address a zero-day vulnerability (CVE-2025-24200) that was exploited in highly targeted attacks. The [...]
  • News
Posted on February 11, 2025 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software