Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Microsoft Provides Workaround for Windows 11 Update Blocking Issue

Microsoft has offered a solution for users experiencing blocked security updates on certain Windows 11 24H2 systems. The issue occurs [...]
  • News
Posted on February 9, 2025 by Mash

Cisco Patches Critical ISE Flaws Allowing Root Command Execution

Cisco has released fixes for two critical vulnerabilities (CVE-2025-20124 and CVE-2025-20125) in its Identity Services Engine (ISE) platform, a widely [...]
  • News
Posted on February 8, 2025 by Mash

AMD Resolves Vulnerability Allowing Malicious Microcode Updates

AMD has released firmware and microcode updates to mitigate a high-severity flaw (CVE-2024-56161) that could enable attackers with local admin [...]
  • News
Posted on February 7, 2025 by Mash

Chinese Cyberspies Deploy New SSH Backdoor for Covert Network Attacks

A Chinese cyber-espionage group, Evasive Panda (also known as DaggerFly), has been using a newly discovered SSH backdoor, "ELF/Sshdinjector.A!tr," to [...]
  • News
Posted on February 6, 2025 by Mash

Google Resolves Two Android Zero-Days Exploited in Targeted Attacks

As part of its November security updates, Google patched two Android zero-day vulnerabilities, CVE-2024-43047 and CVE-2024-43093, both actively exploited in [...]
  • News
Posted on February 4, 2025 by Mash

PyPI Introduces Project Archival to Enhance Supply Chain Security

PyPI has launched a new 'Project Archival' system, enabling developers to mark projects as archived, signaling users that no future [...]
  • News
Posted on February 4, 2025 by Mash

State-Sponsored Hackers Exploit Google’s Gemini AI for Cyber Operations

Google's Threat Intelligence Group (GTIG) has identified government-backed APT groups from over 20 countries, including Iran, China, North Korea, and [...]
  • News
Posted on February 2, 2025 by Mash

Microsoft Enhances Text Contrast for Windows Chromium Browsers

Microsoft has improved text contrast for all Chromium-based browsers on Windows, including Google Chrome and Edge, by integrating enhanced gamma [...]
  • News
Posted on February 2, 2025 by Mash

Backdoor Discovered in Healthcare Patient Monitors, Data Sent to Chinese IP

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about Contec CMS8000 patient monitors, which secretly send [...]
  • News
Posted on February 1, 2025 by Mash

Aquabotv3 Botnet Targets Mitel Flaw in New Attack Campaign

Akamai researchers have identified Aquabotv3, a new variant of the Mirai-based botnet malware, exploiting the CVE-2024-41710 vulnerability in Mitel SIP [...]
  • News
Posted on January 31, 2025 by Mash

Microsoft Tests AI-Powered Scareware Blocker for Edge Browser

Microsoft is testing a new scareware blocker in its Edge browser, designed to protect Windows PC users from tech support [...]
  • News
Posted on January 30, 2025 by Mash

DeepSeek Halts New Signups Amid Large-Scale Cyberattack

Chinese AI platform DeepSeek has paused new registrations for its DeepSeek-V3 chat service following a major cyberattack. The platform recently [...]
  • News
Posted on January 29, 2025 by Mash

Fake Reddit and WeTransfer Sites Spread Lumma Stealer Malware

Hackers have set up nearly 1,000 fake web pages impersonating Reddit and WeTransfer to distribute Lumma Stealer malware. The scam [...]
  • News
Posted on January 26, 2025 by Mash

Google Unveils Customizable Web Store for Enterprise Chrome Extensions

Google has launched a Chrome Web Store tailored for enterprises, enabling organizations to create a curated list of trusted extensions [...]
  • News
Posted on January 24, 2025 by Mash

Critical Zero-Day Flaws in WordPress Real Estate Tools Remain Unpatched

Two severe vulnerabilities in the RealHome theme and Easy Real Estate plugin for WordPress could allow attackers to gain administrator [...]
  • News
Posted on January 24, 2025 by Mash

7-Zip Fixes Vulnerability Allowing Bypass of Windows Security Warnings

A high-severity vulnerability in 7-Zip (CVE-2025-0411) allowed attackers to bypass Windows' Mark of the Web (MotW) security mechanism, enabling the [...]
  • News
Posted on January 23, 2025 by Mash

HPE Investigates Hacker Claims of Source Code Theft

Hewlett Packard Enterprise (HPE) is probing allegations by threat actor IntelBroker, who claims to have accessed the company’s developer environments [...]
  • News
Posted on January 22, 2025 by Mash

Malicious PyPi Package Targets Discord Developers to Steal Tokens and Set Up Backdoor

A malicious package named 'pycord-self' on PyPi has been discovered, designed to steal Discord authentication tokens and establish a backdoor [...]
  • News
Posted on January 19, 2025 by Mash

Critical UEFI Secure Boot Flaw Exposes Systems to Bootkit Attacks

A new vulnerability, CVE-2024-7344, has been discovered in UEFI Secure Boot, affecting Microsoft-signed applications in third-party system recovery tools. The [...]
  • News
Posted on January 18, 2025 by Mash

Fake GitHub Exploit Infects Users with Data-Stealing Malware

A fraudulent proof-of-concept (PoC) exploit for the LDAPNightmare vulnerability (CVE-2024-49113) has been circulating on GitHub, secretly deploying infostealer malware that [...]
  • News
Posted on January 14, 2025 by Mash

False Malware Alert Disrupts Docker Desktop on macOS

Docker Desktop is failing to start on macOS due to false malware alerts stemming from files signed with an incorrect [...]
  • News
Posted on January 12, 2025 by Mash

Hackers Exploit KerioControl Vulnerability for Remote Code Execution

Cybercriminals are exploiting CVE-2024-52875, a critical CRLF injection flaw in GFI KerioControl firewalls, to execute remote code and steal sensitive [...]
  • News
Posted on January 10, 2025 by Mash

Chrome Extensions Breached in Coordinated Attack, User Data at Risk

At least five Chrome extensions were compromised in a planned cyberattack, where threat actors injected code to steal sensitive user [...]
  • News
Posted on December 29, 2024 by Mash

Windows 11 24H2 Update Bug Causes Installation Failures for New Patches

Microsoft has acknowledged an issue affecting Windows 11 24H2 installations, where newer cumulative updates fail if the OS was installed [...]
  • News
Posted on December 27, 2024 by Mash

Emerging Botnet Exploits NVRs and TP-Link Router Vulnerabilities

A new Mirai-based botnet is actively targeting vulnerabilities in DigiEver DS-2105 Pro NVRs and outdated TP-Link routers, exploiting a previously [...]
  • News
Posted on December 26, 2024 by Mash

Critical Vulnerabilities in WPLMS WordPress Plugins Prompt Urgent Updates

Two WordPress plugins required for the popular WPLMS learning management system (LMS) theme, used by educational and corporate organizations, were [...]
  • News
Posted on December 24, 2024 by Mash

FlowerStorm Emerges as a Leading Microsoft 365 Phishing-as-a-Service Platform

The phishing-as-a-service (PhaaS) platform "FlowerStorm" has gained traction after the Rockstar2FA service suffered a partial collapse in November 2024. Rockstar2FA [...]
  • News
Posted on December 23, 2024 by Mash

Malicious VSCode Extensions Target Developers and Crypto Enthusiasts in Supply Chain Attacks

A wave of malicious Visual Studio Code (VSCode) extensions has been discovered targeting developers and cryptocurrency users, aiming to execute [...]
  • News
Posted on December 20, 2024 by Mash

Fake CAPTCHA Ads Deliver Lumma Stealer Malware via Malvertising Campaign

A large-scale malvertising campaign, dubbed DeceptionAds, has been distributing the Lumma Stealer malware by tricking users into running malicious PowerShell [...]
  • News
Posted on December 18, 2024 by Mash

Winnti Hackers Deploy New Glutton PHP Backdoor to Target Rivals and Organizations

The Chinese state-sponsored hacking group Winnti (APT41) has developed a new PHP backdoor, Glutton, to attack organizations in China and [...]
  • News
Posted on December 17, 2024 by Mash

Stealthy Pumakit Rootkit Targets Older Linux Kernels

The newly discovered Pumakit Linux rootkit uses advanced stealth techniques and privilege escalation to compromise systems while avoiding detection. Identified [...]
  • News
Posted on December 14, 2024 by Mash

EagleMsgSpy Android Spyware Linked to Chinese Authorities

Researchers at Lookout have uncovered a previously unknown Android spyware, dubbed EagleMsgSpy, reportedly used by Chinese law enforcement to monitor [...]
  • News
Posted on December 13, 2024 by Mash

WPForms Vulnerability Exposes Millions of WordPress Sites to Stripe Refund Exploits

A high-severity vulnerability in the WPForms plugin, used by over 6 million WordPress sites, allows subscriber-level users to issue unauthorized [...]
  • News
Posted on December 12, 2024 by Mash

Windows 11 Enhances File Explorer with Tab Restoration and Smarter Features

Windows 11’s File Explorer introduces several updates in Build 22635.4580 (KB5046733), now in beta testing, including the ability to restore [...]
  • News
Posted on December 11, 2024 by Mash

Ultralytics AI Model Exploited to Spread Cryptominer

The popular Ultralytics YOLO11 AI model was compromised in a supply chain attack, infecting users with a cryptominer through versions [...]
  • News
Posted on December 8, 2024 by Mash

DroidBot Malware Targets Banking and Crypto Apps Across Europe

A newly identified Android malware called DroidBot has been stealing credentials from over 77 cryptocurrency exchanges and banking apps in [...]
  • News
Posted on December 6, 2024 by Mash

South Korean CEO Arrested for Embedding DDoS Functionality in Satellite Receivers

South Korean authorities have arrested a CEO and five employees for producing over 240,000 satellite receivers equipped with DDoS attack [...]
  • News
Posted on December 5, 2024 by Mash

SpyLoan Malware on Google Play Reaches 8 Million Downloads Despite Cleanup Efforts

McAfee has uncovered 15 malicious SpyLoan Android apps on Google Play that have been downloaded over 8 million times, primarily [...]
  • News
Posted on December 2, 2024 by Mash

Zabbix Warns Users to Upgrade Following Critical SQL Injection Vulnerability

Zabbix, a leading provider of open-source network and application monitoring tools, has disclosed a critical SQL injection vulnerability (CVE-2024-42327) that [...]
  • News
Posted on December 1, 2024 by Mash

First UEFI Bootkit Malware Targeting Linux Systems Uncovered

ESET researchers have identified Bootkitty, the first UEFI bootkit specifically designed to target Linux systems, signaling an evolution in bootkit [...]
  • News
Posted on November 29, 2024 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software