Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Hackers Exploit macOS Extended Attributes to Conceal Malware

Hackers are employing a new method to hide malicious code in macOS extended file attributes, facilitating the delivery of a [...]
  • News
Posted on November 15, 2024 by Mash

Return of China’s Volt Typhoon Crew: Renewed Botnet Threat

China's Volt Typhoon crew has resurfaced, using compromised legacy Cisco routers to infiltrate critical infrastructure, security experts report. This resurgence [...]
  • News
Posted on November 14, 2024 by Mash

Ymir Ransomware Collaborates with RustyStealer in Recent Attacks

A new ransomware strain called 'Ymir' has emerged, encrypting systems already compromised by the RustyStealer malware. RustyStealer, known since 2021 [...]
  • News
Posted on November 13, 2024 by Mash

Microsoft Attributes Windows Server 2025 Automatic Upgrades to Third-Party Tools

Microsoft has confirmed that some Windows Server 2019 and 2022 systems were unexpectedly upgraded to Windows Server 2025 due to [...]
  • News
Posted on November 13, 2024 by Mash

Windows 11 Updates Disrupt SSH Connections, Microsoft Confirms

Microsoft has acknowledged that Windows 11 updates from October have disrupted SSH connections on certain 22H2 and 23H2 systems. The [...]
  • News
Posted on November 12, 2024 by Mash

Cybercriminals Use Tank Game Scam to Gain Remote Access

Cybercriminals have devised a scheme involving a crypto-themed tank game to gain full access to players' computers. Modern tank games [...]
  • News
Posted on November 10, 2024 by Mash

Fake Avast Antivirus Sites Distribute SpyNote Android Malware

A new variant of SpyNote malware is mimicking Avast Mobile Security to exploit the brand's credibility, according to CYFIRMA. This [...]
  • News
Posted on November 8, 2024 by Mash

New Android Malware 'ToxicPanda' Targets Banking Users with Fraudulent Transfers

A new Android banking malware named ToxicPanda has infected over 1,500 devices, enabling attackers to carry out fraudulent banking transactions [...]
  • News
Posted on November 7, 2024 by Mash

"Pygmy Goat" Malware Used in Sophos Firewall Attack on Government Network, Says UK’s Cyber Security Center

The UK's National Cyber Security Centre (NCSC) released an analysis on "Pygmy Goat," a sophisticated Linux malware crafted to breach [...]
  • News
Posted on November 6, 2024 by Mash

New Study Warns of ChatGPT-4o's Potential for Automated Voice Scams

Researchers have demonstrated that OpenAI's ChatGPT-4o, with its real-time voice API, could be exploited for autonomous scams, achieving success in [...]
  • News
Posted on November 5, 2024 by Mash

Microsoft Alerts Azure Virtual Desktop Users to Black Screen Problem

Microsoft has warned that Azure Virtual Desktop (AVD) users may experience up to 30 minutes of black screens when logging [...]
  • News
Posted on November 4, 2024 by Mash

Critical Zero-Day Flaws in PTZ Cameras Exploited by Hackers

Hackers are exploiting two zero-day vulnerabilities, CVE-2024-8956 and CVE-2024-8957, in PTZOptics pan-tilt-zoom cameras used widely in industries like healthcare, government, [...]
  • News
Posted on November 2, 2024 by Mash

North Korean Hackers Tied to Play Ransomware Operations to Evade Sanctions

North Korea's state-sponsored hacking group, Andariel, has been linked to the Play ransomware, potentially acting as an affiliate or initial [...]
  • News
Posted on November 1, 2024 by Mash

Zero-Day Bug in Windows Themes Enables NTLM Credential Theft

A zero-day vulnerability in Windows Themes enables attackers to steal NTLM credentials, exposing users to credential theft risks. Acros Security’s [...]
  • News
Posted on November 1, 2024 by Mash

Russian Espionage Campaign Leverages RDP Files in Large-Scale Phishing Attack

A massive phishing campaign by Russia's foreign intelligence agency, SVR, is in its second week, targeting sectors like government, NGOs, [...]
  • News
Posted on November 1, 2024 by Mash

Researcher Unveils Tool to Circumvent Chrome’s New Cookie Protection

A cybersecurity researcher has released a tool named "Chrome-App-Bound-Encryption-Decryption" that bypasses Google Chrome's App-Bound encryption, allowing extraction of saved credentials [...]
  • News
Posted on October 30, 2024 by Mash

Fog and Akira Ransomware Target SonicWall VPNs to Infiltrate Corporate Networks

The Fog and Akira ransomware groups are actively exploiting a critical vulnerability (CVE-2024-40766) in SonicWall VPNs to gain entry into [...]
  • News
Posted on October 29, 2024 by Mash

New Windows Downgrade Flaw Lets Attackers Bypass Security and Install Rootkits

A newly uncovered vulnerability in Windows allows attackers to bypass Driver Signature Enforcement (DSE) by downgrading Windows kernel components, enabling [...]
  • News
Posted on October 28, 2024 by Mash

Amazon Seizes Malicious Domains Used by APT29 in Global Credential-Theft Campaign

Amazon has taken control of domains used by APT29, a Russian state-backed hacking group, to launch targeted phishing attacks on [...]
  • News
Posted on October 27, 2024 by Mash

Apple Launches Virtual Research Environment for Private Cloud Compute Security Testing

Apple has introduced a Virtual Research Environment (VRE) to allow public access to its Private Cloud Compute (PCC) for security [...]
  • News
Posted on October 26, 2024 by Mash

New Qilin.B Ransomware Strain: Enhanced Encryption and Evasion Tactics

The latest Qilin ransomware variant, known as Qilin.B, has emerged, utilizing Rust-based code for stronger encryption and improved evasion from [...]
  • News
Posted on October 26, 2024 by Mash

Cryptomining Malware Targets Docker Remote API Servers Again

Attackers are exploiting exposed Docker Remote API servers to deploy perfctl cryptomining malware, according to Trend Micro researchers. Sunil Bharti [...]
  • News
Posted on October 24, 2024 by Mash

Google Introduces Curated Chrome Web Stores for Businesses

Google will soon allow organizations to create their own curated "Enterprise Web Store" for Chrome and ChromeOS extensions, focusing on [...]
  • News
Posted on October 24, 2024 by Mash

North Korean Lazarus Group Exploits Chrome Zero-Day with Fake DeFi Game

The Lazarus hacking group, based in North Korea, exploited a Google Chrome zero-day vulnerability (CVE-2024-4947) using a fake decentralized finance [...]
  • News
Posted on October 24, 2024 by Mash

Google Chrome to Phase Out Popular Ad Blockers Like uBlock Origin Amid Manifest V2 Deprecation

Google's Chrome Web Store is warning users that uBlock Origin and other extensions using the Manifest V2 specification may soon [...]
  • News
Posted on October 15, 2024 by Mash

Ivanti Addressed Actively Exploited CSA Zero-day Vulnerabilities

Ivanti, an American IT software company, has released critical security updates addressing three new zero-day vulnerabilities in its Cloud Services [...]
  • News
Posted on October 10, 2024 by Mash

Hackers Are Doing 'Pig Butchering' Scams Using Fake Trading Apps

Fake trading apps on Google Play and Apple's App Store have lured victims into "pig butchering" scams with global reach. [...]
  • News
Posted on October 6, 2024 by Mash

Vulnerabilities In Kia's Dealer Portal Can Be Abused To Steal Cars

Researchers found flaws in Kia's dealer portal, allowing hackers to locate and steal cars made after 2013 using only the [...]
  • News
Posted on September 29, 2024 by Mash

Chrome's App-Bound Encryption Feature Bypased By Infostealer Malware

Infostealer malware developers have updated their tools to claim they can bypass Google Chrome's App-Bound Encryption, which protects sensitive data [...]
  • News
Posted on September 26, 2024 by Mash

"Marko Polo" Hacking Group Targets Various Users In Enormous Data Stealing Operation

A sprawling infostealer malware operation, led by the cybercriminal group "Marko Polo," has been uncovered. Thirty campaigns have targeted diverse [...]
  • News
Posted on September 24, 2024 by Mash

Apple's New macOS 'Sequoia' Causes Network Connection Problems When Running VPN or EDR Software

Users of macOS 15 'Sequoia' are experiencing network connection problems linked to certain endpoint detection and response (EDR) and VPN [...]
  • News
Posted on September 22, 2024 by Mash

Recently Fixed Windows Vulnerability Was Previously Exploited By Hackers To Install Info Stealers

The recently patched "Windows MSHTML spoofing vulnerability" (CVE-2024-43461) has been reclassified as previously exploited by the Void Banshee APT group. [...]
  • News
Posted on September 17, 2024 by Mash

TDSSKiller Tool Used By Hackers To Disable EDR Software

The RansomHub ransomware group has utilized TDSSKiller, a legitimate tool developed by Kaspersky, to deactivate endpoint detection and response (EDR) [...]
  • News
Posted on September 13, 2024 by Mash

New Quad7 Botnet Opeartion Targeting VPN Routers and Media Servers

The Quad7 botnet expands its targets to include Zyxel VPN appliances, Ruckus wireless routers, and Axentra media servers, alongside previously [...]
  • News
Posted on September 11, 2024 by Mash

Docker-OSX Open-Source Project Removed from Docker Hub due to DMCA from Apple

The Docker-OSX project, an open-source initiative by Sick.Codes, enabling macOS virtualization on non-Apple hardware, was recently removed from Docker Hub [...]
  • News
Posted on September 3, 2024 by Mash

Corona Mirai Botnet Exploiting RCE Zero-Day in AVTECH IP Cameras To Spread

The Corona Mirai-based malware botnet exploits a 5-year-old zero-day in discontinued AVTECH IP cameras (CVE-2024-7029). This high-severity issue (CVSS v4 [...]
  • News
Posted on August 31, 2024 by Mash

Chinese Hacking Group Volt Typhoon Attacks ISPs, MSPs by Exploiting Versa Director Vulnerability

The Chinese state-backed hacking group Volt Typhoon exploited a zero-day flaw (CVE-2024-39717) in Versa Director, a platform used by ISPs [...]
  • News
Posted on August 29, 2024 by Mash

Recently Discovered Linux Malware 'sedexp' Has Been Active For 2 Years

A Linux malware called 'sedexp' has remained undetected since 2022 by employing a stealthy persistence technique not currently listed in [...]
  • News
Posted on August 26, 2024 by Mash

Attackers Using AppDomain Manager Injection Technique In Recent Cyberattacks

Since July 2024, a series of attacks using AppDomain Manager Injection, a less common technique, have targeted Microsoft .NET applications [...]
  • News
Posted on August 25, 2024 by Mash

SolarWinds Addresses Critical Web Help Desk Vulnerability

SolarWinds released a critical hotfix for Web Help Desk (WHD) to fix a vulnerability (CVE-2024-28987) allowing attackers to exploit hardcoded [...]
  • News
Posted on August 24, 2024 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software