Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

NachoVPN Flaws Exploit VPN Clients to Deliver Malicious Updates

Researchers from AmberWolf have identified vulnerabilities, collectively named "NachoVPN," in SonicWall and Palo Alto SSL-VPN clients. These flaws allow attacker-controlled [...]
  • News
Posted on November 28, 2024 by Mash

Ransomware Attack on Blue Yonder Causes Supply Chain Disruptions

A ransomware attack on supply chain management firm Blue Yonder has caused widespread service outages, affecting major grocery store chains [...]
  • News
Posted on November 27, 2024 by Mash

Windows 11 File Explorer Introduces Tab Management and Customizable Backup Prompts

Microsoft is enhancing File Explorer in Windows 11 with new features aimed at improving user experience. In Windows 11 Build [...]
  • News
Posted on November 26, 2024 by Mash

Windows 11 24H2 Update Halted for PCs Running Ubisoft Games Due to Crashes

Microsoft has paused the rollout of the Windows 11 24H2 update for systems with Ubisoft titles like Assassin's Creed, Star [...]
  • News
Posted on November 25, 2024 by Mash

Microsoft Launches AI-Driven Recall for Copilot+ PCs with Privacy Safeguards

Microsoft has officially rolled out its AI-powered Recall feature to Windows Insiders using Snapdragon-based Copilot+ PCs in the Dev Channel, [...]
  • News
Posted on November 24, 2024 by Mash

Microsoft Halts WinAppSDK Update Causing Windows 10 App Errors

Microsoft has acknowledged a problem affecting Windows 10 users since November 12, where packaged applications like Microsoft Teams cannot be [...]
  • News
Posted on November 23, 2024 by Mash

Decade-Old Vulnerability in Ubuntu’s 'Needrestart' Tool Enables Root Privileges

Five local privilege escalation (LPE) vulnerabilities, present in Ubuntu’s needrestart utility since 2014, were discovered by Qualys and recently patched [...]
  • News
Posted on November 22, 2024 by Mash

Apple Patches Two Zero-Day Vulnerabilities Exploited in Attacks on Macs

Apple has issued emergency updates to address two actively exploited zero-day vulnerabilities affecting Intel-based Mac systems. The flaws, CVE-2024-44308 and [...]
  • News
Posted on November 21, 2024 by Mash

Google’s Shielded Email to Enhance Privacy with Email Aliases

Google is reportedly preparing to launch a "Shielded Email" feature that lets users create disposable email aliases for signing up [...]
  • News
Posted on November 20, 2024 by Mash

Phishing Campaigns Increasingly Exploit SVG Attachments to Bypass Detection

Cybercriminals are increasingly leveraging Scalable Vector Graphics (SVG) files in phishing emails to display fake login forms or deliver malware [...]
  • News
Posted on November 19, 2024 by Mash

Critical Flaw in Popular WordPress Plugin Exposes Millions of Sites

A severe authentication bypass vulnerability, CVE-2024-10924, has been found in the WordPress plugin "Really Simple Security" (formerly "Really Simple SSL"). [...]
  • News
Posted on November 19, 2024 by Mash

Botnet Exploits GeoVision Zero-Day to Spread Mirai Malware

A zero-day vulnerability in outdated GeoVision devices is being exploited by a malware botnet, potentially for DDoS or cryptomining purposes. [...]
  • News
Posted on November 17, 2024 by Mash

Glove Stealer Malware Circumvents Chrome Cookie Protection

The newly identified Glove Stealer malware has found a way to bypass Google Chrome's App-Bound encryption, enabling it to steal [...]
  • News
Posted on November 16, 2024 by Mash

Hackers Exploit macOS Extended Attributes to Conceal Malware

Hackers are employing a new method to hide malicious code in macOS extended file attributes, facilitating the delivery of a [...]
  • News
Posted on November 15, 2024 by Mash

Return of China’s Volt Typhoon Crew: Renewed Botnet Threat

China's Volt Typhoon crew has resurfaced, using compromised legacy Cisco routers to infiltrate critical infrastructure, security experts report. This resurgence [...]
  • News
Posted on November 14, 2024 by Mash

Ymir Ransomware Collaborates with RustyStealer in Recent Attacks

A new ransomware strain called 'Ymir' has emerged, encrypting systems already compromised by the RustyStealer malware. RustyStealer, known since 2021 [...]
  • News
Posted on November 13, 2024 by Mash

Microsoft Attributes Windows Server 2025 Automatic Upgrades to Third-Party Tools

Microsoft has confirmed that some Windows Server 2019 and 2022 systems were unexpectedly upgraded to Windows Server 2025 due to [...]
  • News
Posted on November 13, 2024 by Mash

Windows 11 Updates Disrupt SSH Connections, Microsoft Confirms

Microsoft has acknowledged that Windows 11 updates from October have disrupted SSH connections on certain 22H2 and 23H2 systems. The [...]
  • News
Posted on November 12, 2024 by Mash

Cybercriminals Use Tank Game Scam to Gain Remote Access

Cybercriminals have devised a scheme involving a crypto-themed tank game to gain full access to players' computers. Modern tank games [...]
  • News
Posted on November 10, 2024 by Mash

Fake Avast Antivirus Sites Distribute SpyNote Android Malware

A new variant of SpyNote malware is mimicking Avast Mobile Security to exploit the brand's credibility, according to CYFIRMA. This [...]
  • News
Posted on November 8, 2024 by Mash

New Android Malware 'ToxicPanda' Targets Banking Users with Fraudulent Transfers

A new Android banking malware named ToxicPanda has infected over 1,500 devices, enabling attackers to carry out fraudulent banking transactions [...]
  • News
Posted on November 7, 2024 by Mash

"Pygmy Goat" Malware Used in Sophos Firewall Attack on Government Network, Says UK’s Cyber Security Center

The UK's National Cyber Security Centre (NCSC) released an analysis on "Pygmy Goat," a sophisticated Linux malware crafted to breach [...]
  • News
Posted on November 6, 2024 by Mash

New Study Warns of ChatGPT-4o's Potential for Automated Voice Scams

Researchers have demonstrated that OpenAI's ChatGPT-4o, with its real-time voice API, could be exploited for autonomous scams, achieving success in [...]
  • News
Posted on November 5, 2024 by Mash

Microsoft Alerts Azure Virtual Desktop Users to Black Screen Problem

Microsoft has warned that Azure Virtual Desktop (AVD) users may experience up to 30 minutes of black screens when logging [...]
  • News
Posted on November 4, 2024 by Mash

Critical Zero-Day Flaws in PTZ Cameras Exploited by Hackers

Hackers are exploiting two zero-day vulnerabilities, CVE-2024-8956 and CVE-2024-8957, in PTZOptics pan-tilt-zoom cameras used widely in industries like healthcare, government, [...]
  • News
Posted on November 2, 2024 by Mash

North Korean Hackers Tied to Play Ransomware Operations to Evade Sanctions

North Korea's state-sponsored hacking group, Andariel, has been linked to the Play ransomware, potentially acting as an affiliate or initial [...]
  • News
Posted on November 1, 2024 by Mash

Zero-Day Bug in Windows Themes Enables NTLM Credential Theft

A zero-day vulnerability in Windows Themes enables attackers to steal NTLM credentials, exposing users to credential theft risks. Acros Security’s [...]
  • News
Posted on November 1, 2024 by Mash

Russian Espionage Campaign Leverages RDP Files in Large-Scale Phishing Attack

A massive phishing campaign by Russia's foreign intelligence agency, SVR, is in its second week, targeting sectors like government, NGOs, [...]
  • News
Posted on November 1, 2024 by Mash

Researcher Unveils Tool to Circumvent Chrome’s New Cookie Protection

A cybersecurity researcher has released a tool named "Chrome-App-Bound-Encryption-Decryption" that bypasses Google Chrome's App-Bound encryption, allowing extraction of saved credentials [...]
  • News
Posted on October 30, 2024 by Mash

Fog and Akira Ransomware Target SonicWall VPNs to Infiltrate Corporate Networks

The Fog and Akira ransomware groups are actively exploiting a critical vulnerability (CVE-2024-40766) in SonicWall VPNs to gain entry into [...]
  • News
Posted on October 29, 2024 by Mash

New Windows Downgrade Flaw Lets Attackers Bypass Security and Install Rootkits

A newly uncovered vulnerability in Windows allows attackers to bypass Driver Signature Enforcement (DSE) by downgrading Windows kernel components, enabling [...]
  • News
Posted on October 28, 2024 by Mash

Amazon Seizes Malicious Domains Used by APT29 in Global Credential-Theft Campaign

Amazon has taken control of domains used by APT29, a Russian state-backed hacking group, to launch targeted phishing attacks on [...]
  • News
Posted on October 27, 2024 by Mash

Apple Launches Virtual Research Environment for Private Cloud Compute Security Testing

Apple has introduced a Virtual Research Environment (VRE) to allow public access to its Private Cloud Compute (PCC) for security [...]
  • News
Posted on October 26, 2024 by Mash

New Qilin.B Ransomware Strain: Enhanced Encryption and Evasion Tactics

The latest Qilin ransomware variant, known as Qilin.B, has emerged, utilizing Rust-based code for stronger encryption and improved evasion from [...]
  • News
Posted on October 26, 2024 by Mash

Cryptomining Malware Targets Docker Remote API Servers Again

Attackers are exploiting exposed Docker Remote API servers to deploy perfctl cryptomining malware, according to Trend Micro researchers. Sunil Bharti [...]
  • News
Posted on October 24, 2024 by Mash

Google Introduces Curated Chrome Web Stores for Businesses

Google will soon allow organizations to create their own curated "Enterprise Web Store" for Chrome and ChromeOS extensions, focusing on [...]
  • News
Posted on October 24, 2024 by Mash

North Korean Lazarus Group Exploits Chrome Zero-Day with Fake DeFi Game

The Lazarus hacking group, based in North Korea, exploited a Google Chrome zero-day vulnerability (CVE-2024-4947) using a fake decentralized finance [...]
  • News
Posted on October 24, 2024 by Mash

Google Chrome to Phase Out Popular Ad Blockers Like uBlock Origin Amid Manifest V2 Deprecation

Google's Chrome Web Store is warning users that uBlock Origin and other extensions using the Manifest V2 specification may soon [...]
  • News
Posted on October 15, 2024 by Mash

Ivanti Addressed Actively Exploited CSA Zero-day Vulnerabilities

Ivanti, an American IT software company, has released critical security updates addressing three new zero-day vulnerabilities in its Cloud Services [...]
  • News
Posted on October 10, 2024 by Mash

Hackers Are Doing 'Pig Butchering' Scams Using Fake Trading Apps

Fake trading apps on Google Play and Apple's App Store have lured victims into "pig butchering" scams with global reach. [...]
  • News
Posted on October 6, 2024 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software