Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Google Unveils Customizable Web Store for Enterprise Chrome Extensions

Google has launched a Chrome Web Store tailored for enterprises, enabling organizations to create a curated list of trusted extensions [...]
  • News
Posted on January 24, 2025 by Mash

Critical Zero-Day Flaws in WordPress Real Estate Tools Remain Unpatched

Two severe vulnerabilities in the RealHome theme and Easy Real Estate plugin for WordPress could allow attackers to gain administrator [...]
  • News
Posted on January 24, 2025 by Mash

7-Zip Fixes Vulnerability Allowing Bypass of Windows Security Warnings

A high-severity vulnerability in 7-Zip (CVE-2025-0411) allowed attackers to bypass Windows' Mark of the Web (MotW) security mechanism, enabling the [...]
  • News
Posted on January 23, 2025 by Mash

HPE Investigates Hacker Claims of Source Code Theft

Hewlett Packard Enterprise (HPE) is probing allegations by threat actor IntelBroker, who claims to have accessed the company’s developer environments [...]
  • News
Posted on January 22, 2025 by Mash

Malicious PyPi Package Targets Discord Developers to Steal Tokens and Set Up Backdoor

A malicious package named 'pycord-self' on PyPi has been discovered, designed to steal Discord authentication tokens and establish a backdoor [...]
  • News
Posted on January 19, 2025 by Mash

Critical UEFI Secure Boot Flaw Exposes Systems to Bootkit Attacks

A new vulnerability, CVE-2024-7344, has been discovered in UEFI Secure Boot, affecting Microsoft-signed applications in third-party system recovery tools. The [...]
  • News
Posted on January 18, 2025 by Mash

Fake GitHub Exploit Infects Users with Data-Stealing Malware

A fraudulent proof-of-concept (PoC) exploit for the LDAPNightmare vulnerability (CVE-2024-49113) has been circulating on GitHub, secretly deploying infostealer malware that [...]
  • News
Posted on January 14, 2025 by Mash

False Malware Alert Disrupts Docker Desktop on macOS

Docker Desktop is failing to start on macOS due to false malware alerts stemming from files signed with an incorrect [...]
  • News
Posted on January 12, 2025 by Mash

Hackers Exploit KerioControl Vulnerability for Remote Code Execution

Cybercriminals are exploiting CVE-2024-52875, a critical CRLF injection flaw in GFI KerioControl firewalls, to execute remote code and steal sensitive [...]
  • News
Posted on January 10, 2025 by Mash

Chrome Extensions Breached in Coordinated Attack, User Data at Risk

At least five Chrome extensions were compromised in a planned cyberattack, where threat actors injected code to steal sensitive user [...]
  • News
Posted on December 29, 2024 by Mash

Windows 11 24H2 Update Bug Causes Installation Failures for New Patches

Microsoft has acknowledged an issue affecting Windows 11 24H2 installations, where newer cumulative updates fail if the OS was installed [...]
  • News
Posted on December 27, 2024 by Mash

Emerging Botnet Exploits NVRs and TP-Link Router Vulnerabilities

A new Mirai-based botnet is actively targeting vulnerabilities in DigiEver DS-2105 Pro NVRs and outdated TP-Link routers, exploiting a previously [...]
  • News
Posted on December 26, 2024 by Mash

Critical Vulnerabilities in WPLMS WordPress Plugins Prompt Urgent Updates

Two WordPress plugins required for the popular WPLMS learning management system (LMS) theme, used by educational and corporate organizations, were [...]
  • News
Posted on December 24, 2024 by Mash

FlowerStorm Emerges as a Leading Microsoft 365 Phishing-as-a-Service Platform

The phishing-as-a-service (PhaaS) platform "FlowerStorm" has gained traction after the Rockstar2FA service suffered a partial collapse in November 2024. Rockstar2FA [...]
  • News
Posted on December 23, 2024 by Mash

Malicious VSCode Extensions Target Developers and Crypto Enthusiasts in Supply Chain Attacks

A wave of malicious Visual Studio Code (VSCode) extensions has been discovered targeting developers and cryptocurrency users, aiming to execute [...]
  • News
Posted on December 20, 2024 by Mash

Fake CAPTCHA Ads Deliver Lumma Stealer Malware via Malvertising Campaign

A large-scale malvertising campaign, dubbed DeceptionAds, has been distributing the Lumma Stealer malware by tricking users into running malicious PowerShell [...]
  • News
Posted on December 18, 2024 by Mash

Winnti Hackers Deploy New Glutton PHP Backdoor to Target Rivals and Organizations

The Chinese state-sponsored hacking group Winnti (APT41) has developed a new PHP backdoor, Glutton, to attack organizations in China and [...]
  • News
Posted on December 17, 2024 by Mash

Stealthy Pumakit Rootkit Targets Older Linux Kernels

The newly discovered Pumakit Linux rootkit uses advanced stealth techniques and privilege escalation to compromise systems while avoiding detection. Identified [...]
  • News
Posted on December 14, 2024 by Mash

EagleMsgSpy Android Spyware Linked to Chinese Authorities

Researchers at Lookout have uncovered a previously unknown Android spyware, dubbed EagleMsgSpy, reportedly used by Chinese law enforcement to monitor [...]
  • News
Posted on December 13, 2024 by Mash

WPForms Vulnerability Exposes Millions of WordPress Sites to Stripe Refund Exploits

A high-severity vulnerability in the WPForms plugin, used by over 6 million WordPress sites, allows subscriber-level users to issue unauthorized [...]
  • News
Posted on December 12, 2024 by Mash

Windows 11 Enhances File Explorer with Tab Restoration and Smarter Features

Windows 11’s File Explorer introduces several updates in Build 22635.4580 (KB5046733), now in beta testing, including the ability to restore [...]
  • News
Posted on December 11, 2024 by Mash

Ultralytics AI Model Exploited to Spread Cryptominer

The popular Ultralytics YOLO11 AI model was compromised in a supply chain attack, infecting users with a cryptominer through versions [...]
  • News
Posted on December 8, 2024 by Mash

DroidBot Malware Targets Banking and Crypto Apps Across Europe

A newly identified Android malware called DroidBot has been stealing credentials from over 77 cryptocurrency exchanges and banking apps in [...]
  • News
Posted on December 6, 2024 by Mash

South Korean CEO Arrested for Embedding DDoS Functionality in Satellite Receivers

South Korean authorities have arrested a CEO and five employees for producing over 240,000 satellite receivers equipped with DDoS attack [...]
  • News
Posted on December 5, 2024 by Mash

SpyLoan Malware on Google Play Reaches 8 Million Downloads Despite Cleanup Efforts

McAfee has uncovered 15 malicious SpyLoan Android apps on Google Play that have been downloaded over 8 million times, primarily [...]
  • News
Posted on December 2, 2024 by Mash

Zabbix Warns Users to Upgrade Following Critical SQL Injection Vulnerability

Zabbix, a leading provider of open-source network and application monitoring tools, has disclosed a critical SQL injection vulnerability (CVE-2024-42327) that [...]
  • News
Posted on December 1, 2024 by Mash

First UEFI Bootkit Malware Targeting Linux Systems Uncovered

ESET researchers have identified Bootkitty, the first UEFI bootkit specifically designed to target Linux systems, signaling an evolution in bootkit [...]
  • News
Posted on November 29, 2024 by Mash

NachoVPN Flaws Exploit VPN Clients to Deliver Malicious Updates

Researchers from AmberWolf have identified vulnerabilities, collectively named "NachoVPN," in SonicWall and Palo Alto SSL-VPN clients. These flaws allow attacker-controlled [...]
  • News
Posted on November 28, 2024 by Mash

Ransomware Attack on Blue Yonder Causes Supply Chain Disruptions

A ransomware attack on supply chain management firm Blue Yonder has caused widespread service outages, affecting major grocery store chains [...]
  • News
Posted on November 27, 2024 by Mash

Windows 11 File Explorer Introduces Tab Management and Customizable Backup Prompts

Microsoft is enhancing File Explorer in Windows 11 with new features aimed at improving user experience. In Windows 11 Build [...]
  • News
Posted on November 26, 2024 by Mash

Windows 11 24H2 Update Halted for PCs Running Ubisoft Games Due to Crashes

Microsoft has paused the rollout of the Windows 11 24H2 update for systems with Ubisoft titles like Assassin's Creed, Star [...]
  • News
Posted on November 25, 2024 by Mash

Microsoft Launches AI-Driven Recall for Copilot+ PCs with Privacy Safeguards

Microsoft has officially rolled out its AI-powered Recall feature to Windows Insiders using Snapdragon-based Copilot+ PCs in the Dev Channel, [...]
  • News
Posted on November 24, 2024 by Mash

Microsoft Halts WinAppSDK Update Causing Windows 10 App Errors

Microsoft has acknowledged a problem affecting Windows 10 users since November 12, where packaged applications like Microsoft Teams cannot be [...]
  • News
Posted on November 23, 2024 by Mash

Decade-Old Vulnerability in Ubuntu’s 'Needrestart' Tool Enables Root Privileges

Five local privilege escalation (LPE) vulnerabilities, present in Ubuntu’s needrestart utility since 2014, were discovered by Qualys and recently patched [...]
  • News
Posted on November 22, 2024 by Mash

Apple Patches Two Zero-Day Vulnerabilities Exploited in Attacks on Macs

Apple has issued emergency updates to address two actively exploited zero-day vulnerabilities affecting Intel-based Mac systems. The flaws, CVE-2024-44308 and [...]
  • News
Posted on November 21, 2024 by Mash

Google’s Shielded Email to Enhance Privacy with Email Aliases

Google is reportedly preparing to launch a "Shielded Email" feature that lets users create disposable email aliases for signing up [...]
  • News
Posted on November 20, 2024 by Mash

Phishing Campaigns Increasingly Exploit SVG Attachments to Bypass Detection

Cybercriminals are increasingly leveraging Scalable Vector Graphics (SVG) files in phishing emails to display fake login forms or deliver malware [...]
  • News
Posted on November 19, 2024 by Mash

Critical Flaw in Popular WordPress Plugin Exposes Millions of Sites

A severe authentication bypass vulnerability, CVE-2024-10924, has been found in the WordPress plugin "Really Simple Security" (formerly "Really Simple SSL"). [...]
  • News
Posted on November 19, 2024 by Mash

Botnet Exploits GeoVision Zero-Day to Spread Mirai Malware

A zero-day vulnerability in outdated GeoVision devices is being exploited by a malware botnet, potentially for DDoS or cryptomining purposes. [...]
  • News
Posted on November 17, 2024 by Mash

Glove Stealer Malware Circumvents Chrome Cookie Protection

The newly identified Glove Stealer malware has found a way to bypass Google Chrome's App-Bound encryption, enabling it to steal [...]
  • News
Posted on November 16, 2024 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software