Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

VanHelsing Ransomware Targets Multiple Platforms with Advanced Stealth

A new ransomware operation, VanHelsing, has surfaced as a multi-platform RaaS (Ransomware-as-a-Service), attacking Windows, Linux, BSD, ARM, and ESXi systems. [...]
  • News
Posted on March 26, 2025 by Mash

FBI Confirms Fake File Converters Are Spreading Malware

The FBI warns that cybercriminals are using fake online document converters to distribute malware, steal sensitive data, and even launch [...]
  • News
Posted on March 25, 2025 by Mash

Hackers Exploit Microsoft Trusted Signing to Sign Malware

Cybercriminals are misusing Microsoft’s Trusted Signing service to code-sign malware using short-lived three-day certificates, making malicious files appear legitimate. Code-signing [...]
  • News
Posted on March 24, 2025 by Mash

Hackers Now Exploiting Critical Cisco Smart Licensing Utility Flaws

Cybercriminals have begun attacking unpatched Cisco Smart Licensing Utility (CSLU) instances by exploiting a vulnerability that provides access to a [...]
  • News
Posted on March 22, 2025 by Mash

DollyWay Malware Campaign Hijacks 20,000 WordPress Sites for Redirection Scams

Since 2016, the DollyWay malware campaign has compromised over 20,000 WordPress sites worldwide, redirecting visitors to fraudulent pages promoting scams [...]
  • News
Posted on March 20, 2025 by Mash

Windows Zero-Day Exploited by State Hackers Since 2017, Microsoft Yet to Patch

At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been using a newly discovered Windows [...]
  • News
  • Windows
Posted on March 19, 2025 by Mash

March Windows Update Accidentally Removes Copilot from Some Systems

Microsoft has confirmed that the March 2025 cumulative updates for Windows 10 and Windows 11 mistakenly uninstall the Copilot digital [...]
  • News
Posted on March 19, 2025 by Mash

Fake Adobe and DocuSign OAuth Apps Target Microsoft 365 Users

Cybercriminals are using deceptive Microsoft OAuth apps disguised as Adobe and DocuSign tools to spread malware and steal Microsoft 365 [...]
  • News
Posted on March 18, 2025 by Mash

Microsoft Apologizes for Wrongly Removing Popular VSCode Extensions

Microsoft has restored the ‘Material Theme – Free’ and ‘Material Theme Icons – Free’ extensions on the Visual Studio Marketplace [...]
  • News
Posted on March 14, 2025 by Mash

Facebook Warns of Actively Exploited FreeType 2 Vulnerability

Facebook has disclosed a critical FreeType vulnerability (CVE-2025-27363) that can enable arbitrary code execution and has reportedly been exploited in [...]
  • News
Posted on March 13, 2025 by Mash

Unpatched Edimax IP Camera Flaw Exploited in Botnet Attacks

A critical command injection vulnerability (CVE-2025-1316) in the Edimax IC-7100 IP camera is actively being exploited by botnet malware to [...]
  • News
Posted on March 10, 2025 by Mash

YouTubers Blackmailed with Copyright Strikes to Distribute Malware

Cybercriminals are falsely claiming copyright ownership of Windows Packet Divert (WPD) tools to pressure YouTube creators into spreading malware and [...]
  • News
Posted on March 10, 2025 by Mash

Eleven11bot Botnet Infects 86,000 IoT Devices for Large-Scale DDoS Attacks

A new botnet called Eleven11bot has compromised over 86,000 IoT devices, mainly security cameras and network video recorders (NVRs), to [...]
  • News
Posted on March 6, 2025 by Mash

Vo1d Botnet Expands to Nearly 1.6 Million Android TVs Worldwide

A new strain of the Vo1d malware botnet has infected nearly 1.6 million Android TV devices across 226 countries, integrating [...]
  • News
Posted on March 1, 2025 by Mash

GrassCall Malware Drains Crypto Wallets Through Fake Job Interviews

A social engineering scam has been targeting job seekers in the Web3 industry using a fraudulent "GrassCall" meeting app that [...]
  • News
Posted on February 27, 2025 by Mash

GitVenom Exploits GitHub to Distribute Malware and Steal Crypto

A malware campaign known as GitVenom has been using hundreds of fake GitHub repositories to spread info-stealers, remote access trojans [...]
  • News
Posted on February 27, 2025 by Mash

Microsoft Tests Ad-Supported Office Apps with Limited Features

Microsoft is experimenting with ad-supported versions of its Office desktop apps, allowing users to edit documents with restricted functionality. Unlike [...]
  • News
Posted on February 26, 2025 by Mash

PayPal "New Address" Scam Exploits Platform to Send Phishing Emails

A new phishing scam is abusing PayPal’s address settings to send fraudulent purchase confirmations, tricking users into calling scammers who [...]
  • News
Posted on February 24, 2025 by Mash

Google Chrome Begins Disabling uBlock Origin Amid Manifest V3 Rollout

Google is continuing its phased deprecation of Manifest V2-based extensions, including the popular ad blocker uBlock Origin, as part of [...]
  • News
Posted on February 23, 2025 by Mash

Chinese Hackers Exploit Custom Malware to Spy on U.S. Telecom Networks

The Chinese state-sponsored hacking group Salt Typhoon has been using a custom tool called JumbledPath to covertly monitor network traffic [...]
  • News
Posted on February 22, 2025 by Mash

Chinese Hackers Exploit Microsoft APP-V Tool to Bypass Antivirus

The Chinese APT group "Mustang Panda," also known as Earth Preta, has been abusing Microsoft's Application Virtualization Injector (MAVInject.exe) to [...]
  • News
Posted on February 20, 2025 by Mash

Microsoft Phases Out Location History Feature in Windows

Microsoft is removing the Location History feature from Windows, which previously allowed apps like Cortana to access stored location data [...]
  • News
Posted on February 19, 2025 by Mash

Google Chrome Introduces AI-Enhanced Security for Real-Time Protection

Google Chrome has upgraded its "Enhanced Protection" feature with AI to provide real-time security against malicious websites, downloads, and extensions. [...]
  • News
Posted on February 17, 2025 by Mash

PostgreSQL Zero-Day Exploited in BeyondTrust Cyberattack

Security researchers from Rapid7 revealed that attackers used a previously unknown PostgreSQL vulnerability (CVE-2025-1094) as a zero-day to exploit BeyondTrust’s [...]
  • News
Posted on February 15, 2025 by Mash

whoAMI Attack Exploits AMI Name Confusion to Hijack AWS EC2 Instances

Security researchers at DataDog uncovered a vulnerability called "whoAMI," which lets attackers gain code execution in AWS accounts by publishing [...]
  • News
Posted on February 14, 2025 by Mash

Hackers Ramp Up Attacks on Outdated ThinkPHP and ownCloud Flaws

Hackers are increasingly targeting unpatched systems vulnerable to older security flaws, specifically CVE-2022-47945 in ThinkPHP and CVE-2023-49103 in ownCloud. The [...]
  • News
Posted on February 13, 2025 by Mash

Apple Patches Zero-Day Exploited in Sophisticated Attacks

Apple has issued urgent security updates to address a zero-day vulnerability (CVE-2025-24200) that was exploited in highly targeted attacks. The [...]
  • News
Posted on February 11, 2025 by Mash

Microsoft Provides Workaround for Windows 11 Update Blocking Issue

Microsoft has offered a solution for users experiencing blocked security updates on certain Windows 11 24H2 systems. The issue occurs [...]
  • News
Posted on February 9, 2025 by Mash

Cisco Patches Critical ISE Flaws Allowing Root Command Execution

Cisco has released fixes for two critical vulnerabilities (CVE-2025-20124 and CVE-2025-20125) in its Identity Services Engine (ISE) platform, a widely [...]
  • News
Posted on February 8, 2025 by Mash

AMD Resolves Vulnerability Allowing Malicious Microcode Updates

AMD has released firmware and microcode updates to mitigate a high-severity flaw (CVE-2024-56161) that could enable attackers with local admin [...]
  • News
Posted on February 7, 2025 by Mash

Chinese Cyberspies Deploy New SSH Backdoor for Covert Network Attacks

A Chinese cyber-espionage group, Evasive Panda (also known as DaggerFly), has been using a newly discovered SSH backdoor, "ELF/Sshdinjector.A!tr," to [...]
  • News
Posted on February 6, 2025 by Mash

Google Resolves Two Android Zero-Days Exploited in Targeted Attacks

As part of its November security updates, Google patched two Android zero-day vulnerabilities, CVE-2024-43047 and CVE-2024-43093, both actively exploited in [...]
  • News
Posted on February 4, 2025 by Mash

PyPI Introduces Project Archival to Enhance Supply Chain Security

PyPI has launched a new 'Project Archival' system, enabling developers to mark projects as archived, signaling users that no future [...]
  • News
Posted on February 4, 2025 by Mash

State-Sponsored Hackers Exploit Google’s Gemini AI for Cyber Operations

Google's Threat Intelligence Group (GTIG) has identified government-backed APT groups from over 20 countries, including Iran, China, North Korea, and [...]
  • News
Posted on February 2, 2025 by Mash

Microsoft Enhances Text Contrast for Windows Chromium Browsers

Microsoft has improved text contrast for all Chromium-based browsers on Windows, including Google Chrome and Edge, by integrating enhanced gamma [...]
  • News
Posted on February 2, 2025 by Mash

Backdoor Discovered in Healthcare Patient Monitors, Data Sent to Chinese IP

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about Contec CMS8000 patient monitors, which secretly send [...]
  • News
Posted on February 1, 2025 by Mash

Aquabotv3 Botnet Targets Mitel Flaw in New Attack Campaign

Akamai researchers have identified Aquabotv3, a new variant of the Mirai-based botnet malware, exploiting the CVE-2024-41710 vulnerability in Mitel SIP [...]
  • News
Posted on January 31, 2025 by Mash

Microsoft Tests AI-Powered Scareware Blocker for Edge Browser

Microsoft is testing a new scareware blocker in its Edge browser, designed to protect Windows PC users from tech support [...]
  • News
Posted on January 30, 2025 by Mash

DeepSeek Halts New Signups Amid Large-Scale Cyberattack

Chinese AI platform DeepSeek has paused new registrations for its DeepSeek-V3 chat service following a major cyberattack. The platform recently [...]
  • News
Posted on January 29, 2025 by Mash

Fake Reddit and WeTransfer Sites Spread Lumma Stealer Malware

Hackers have set up nearly 1,000 fake web pages impersonating Reddit and WeTransfer to distribute Lumma Stealer malware. The scam [...]
  • News
Posted on January 26, 2025 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software